Lazarus Hackers Drop New Rat Malware Using 2 Year Old Log4j Bug
The notorious North Korean hacking group known as Lazarus continues to exploit CVE-2021-44228, aka "Log4Shell," this time to deploy three...
The notorious North Korean hacking group known as Lazarus continues to exploit CVE-2021-44228, aka "Log4Shell," this time to deploy three...
A critical severity vulnerability in a WordPress plugin with more than 90,000 installs can let attackers gain remote code execution...
Roughly 1,450 pfSense instances exposed online are vulnerable to command injection and cross-site scripting flaws that, if chained, could enable...
Kyivstar, Ukraine's largest telecommunications service provider serving over 25 million mobile and home internet subscribers, has suffered a cyberattack impacting...
Miklos Daniel Brody, a cloud engineer, was sentenced to two years in prison and a restitution of $529,000 for wiping...
Hackers are attempting to leverage a recently fixed critical vulnerability (CVE-2023-50164) in Apache Struts that leads to remote code execution,...
A new cybercrime marketplace, OLVX, has emerged and is quickly gaining new customers looking to purchase tools to conduct online...
The Ukrainian government's military intelligence service says it hacked the Russian Federal Taxation Service (FNS), wiping the agency's database and...
CISA and partner cybersecurity agencies and intelligence services warned that the APT29 hacking group linked to Russia's Foreign Intelligence Service (SVR)...
Today is Microsoft's December 2023 Patch Tuesday, which includes security updates for a total of 34 flaws and one previously disclosed,...
The Chinese state-sponsored APT hacking group known as Volt Typhoon (Bronze Silhouette) has been linked to a sophisticated botnet named...
The LockBit ransomware operation is now recruiting affiliates and developers from the BlackCat/ALPHV and NoEscape after recent disruptions and exit...
French authorities arrested a Russian national in Paris for allegedly helping the Hive ransomware gang with laundering their victims' ransom...
A new wave of BazarCall attacks uses Google Forms to generate and send payment receipts to victims, attempting to make...
Microsoft's Digital Crimes Unit seized multiple domains used by a Vietnam-based cybercrime group (Storm-1152) that registered over 750 million fraudulent...
Microsoft on Wednesday said it obtained a court order to seize infrastructure set up by a group called Storm-1152 that...
Threat actors affiliated with the Russian Foreign Intelligence Service (SVR) have targeted unpatched JetBrains TeamCity servers in widespread attacks since...
The Iranian state-sponsored threat actor known as OilRig deployed three different downloader malware throughout 2022 to maintain persistent access to...
NAME__________Siemens User Management Component denial of servicePlatforms Affected:Siemens TIA Portal 14 Siemens TIA Portal 16 Siemens Opcenter Quality Siemens SINUMERIK...
NAME__________Fortinet FortiADC information disclosurePlatforms Affected:Fortinet FortiADC 7.0.2 Fortinet FortiADC 7.0.0 Fortinet FortiADC 6.2.4 Fortinet FortiADC 7.1.0Risk Level:7.1Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Fortinet FortiADC...
NAME__________IBM System Storage Virtualization Engine information disclosurePlatforms Affected:IBM Virtualization Engine TS7700 3957-VEC 8.52.103.23 IBM Virtualization Engine TS7700 3957-VED 8.52.103.23 IBM...
NAME__________IBM Spectrum Scale information disclosurePlatforms Affected:IBM Spectrum Scale 5.1.5.1 IBM Spectrum Scale 5.1.5.0Risk Level:5.9Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________IBM Spectrum Scale 5.1.5.0 through...
NAME__________GaatiTrack Courier Management System cross-site scriptingPlatforms Affected:GaatiTrack Courier Management System 1.0Risk Level:6.1Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION__________GaatiTrack Courier Management System is vulnerable to...
NAME__________Xen Server information disclosurePlatforms Affected:Xensource Xen 4.16 XenSource Xen 4.17Risk Level:5.5Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Xen Server could allow a local authenticated attacker...