Ivanti RCE flaw Let Attackers Execute Arbitrary Commands
Ivanti has been discovered with a new vulnerability on Ivanti Standalone Sentry that is associated with Remote code execution. The CVE for this vulnerability has…
Ivanti has been discovered with a new vulnerability on Ivanti Standalone Sentry that is associated with Remote code execution. The CVE for this vulnerability has…
An Iranian hacker group has claimed to have infiltrated the networks of the Dimona nuclear facility located in Israel’s Negev desert. Israeli cybersecurity teams are…
The Pwn2Own 2024 hacking contest saw a record-breaking first day as participants exposed critical vulnerabilities in Tesla vehicles, popular browsers, and operating systems – This…
Mar 21, 2024NewsroomThreat Intelligence / Malware The Russia-linked threat actor known as Turla infected several systems belonging to an unnamed European non-governmental organization (NGO) in…
A previously unknown malware campaign called Sign1 has infected over 39,000 websites over the past six months, causing visitors to see unwanted redirects and popup…
Researchers at Akamai have unveiled a new technique that could potentially put millions of Windows domains at risk. This technique exploits the Dynamic Host Configuration…
Robert Purbeck, a hacker known as “Lifelock” and “Studmaster,” hacked into the computer servers of the City of Newnan, a medical clinic in Griffin, and…
The Federal Communications Commission, or FCC, is on the verge of introducing a cybersecurity labeling system for Internet of Things (IoT) products. This initiative aims…
Mar 21, 2024NewsroomSoftware Security / Open Source New research has discovered over 800 packages in the npm registry which have discrepancies from their registry entries,…
The UK’s National Cyber Security Centre (NCSC) has published guidance aimed at helping CEOs across the private and public sectors understand how best to manage…
Ransomware attacks in healthcare are our biggest threat according to the annual report of Z-Cert.nl. In this report it’s mentioned that the vendors of the…
Security researchers have released a proof-of-concept (PoC) exploit for a critical vulnerability in Fortinet’s FortiClient Enterprise Management Server (EMS) software, which is now actively exploited…