Windows 11 ‘ThemeBleed’ RCE bug gets proof-of-concept exploit
Proof-of-concept exploit code has been published for a Windows Themes vulnerability tracked as CVE-2023-38146 that allows remote attackers to execute code. The security issue is also…
Proof-of-concept exploit code has been published for a Windows Themes vulnerability tracked as CVE-2023-38146 that allows remote attackers to execute code. The security issue is also…
Traditionally, as an industry, we rely heavily on metrics like the cost of a data breach as a tool to discuss return on investment (ROI).…
United Kingdom’s Greater Manchester Police (GMP) said earlier today that some of its employees’ personal information was impacted by a ransomware attack that hit a…
In a recent development, Greater Manchester Police (GMP) officers have fallen victim to a highly sophisticated cyberattack. This attack targeted a technology provider and resulted…
Retool, the company behind the popular development platform for building internal business software, has suffered a breach that allowed attackers to access and take over…
Sep 14, 2023THNEndpoint Security / Vulnerability A set of memory corruption flaws have been discovered in the ncurses (short for new curses) programming library that…
I hope you’ve been doing well! I’ve got a few exciting announcements this week. Come join my buds Tanya Janca and Leif Dreizler for a…
A threat actor and alleged ransomware operator going by the alias USDoD has leaked data on over 3,000 suppliers of aviation giant Airbus after supposedly…
Industrial control system (ICS) computers in the Western world have been increasingly attacked, but the percentages are still smaller compared to other parts of the…
Threat actors use Google Ads tracking templates as a loophole to create convincing Webex software search ads that redirect users to websites that distribute the…
Sep 14, 2023THNSupply Chain / Malware A download manager site served Linux users malware that stealthily stole passwords and other sensitive information for more than…
A high-severity vulnerability in Kubernetes can be exploited to achieve remote code execution (RCE) on all Windows endpoints within the cluster, Akamai’s security researchers warn.…