A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for you in your email box.
If you want to also receive for free the international press subscribe here.
|Experts found 15 flaws in Netgear JGS516PE switch, including a critical RCE|
|Google releases Spectre PoC code exploit for Chrome browser|
|Google fixes the third actively exploited Chrome 0-Day since January|
|NCSC is not aware of ransomware attacks compromising UK orgs through Microsoft Exchange bugs|
|ProxyLogon Microsoft Exchange exploit is completely out of the bag by now|
|US DoJ indicted the CEO of Sky Global encrypted chat platform|
|Is there a link between Microsoft Exchange exploits and PoC code the company shared with partner security firms?|
|Magecart hackers hide captured credit card data in JPG file|
|Microsoft releases On-premises Mitigation Tool (EOMT) tool to fix ProxyLogon issues|
|New Mirai variant appears in the threat landscape|
|China-linked hackers target telcos to steal 5G secrets|
|Data Breaches Tracker monitor unsecured ElasticSearch servers online|
|FBI warns of PYSA Ransomware attacks against Education Institutions in US and UK|
|New ZHtrap botnet uses honeypot to find more victims|
|SolarWinds hackers stole some of Mimecast source code|
|China-linked APT31 group was behind the attack on Finnish Parliament|
|Expert found a 1-Click RCE in the TikTok App for Android|
|Prime Minister Boris Johnson wants to enhance UK cyber capabilities|
|Reading the FBI IC3s ‘2020 Internet Crime Report|
|WINTRIAGE: THE TRIAGE TOOL FOR WINDOWS DFIRERS|
|XcodeSpy Mac malware targets Xcode Developers with a backdoor|
|CISA and FBI warn of ongoing TrickBot attacks|
|Millions of People Can Lose Sensitive Data through Travel Apps, Privacysavvy reports|
|Millions of sites could be hacked due to flaws in popular WordPress plugins|
|Russian National pleads guilty to conspiracy to plant malware on Tesla systems|
|Threat actors are attempting to exploit CVE-2021-22986 in F5 BIG-IP devices in the wild|
|Why Focusing on Container Runtimes Is the Most Critical Piece of Security for EKS Workloads?|
If you want to receive the weekly Security Affairs Newsletter for free subscribe here.
Follow me on Twitter: @securityaffairs and Facebook
(SecurityAffairs – hacking, newsletter)
The post Security Affairs newsletter Round 306 appeared first on Security Affairs.
You may be interested in...
If you like the site, please consider joining the telegram channel or supporting us on Patreon using the button below.