Researchers link the compromise to a North Korean adversary and warn the impacts could be wide ranging.
Related Articles
All CyberSecurityDive →SEC scraps proposed cybersecurity rules for investment advisers, market participants
Listen to the article 3 min This audio is auto-generated. Please let us know if you have feedback. Dive Brief: The Securities and Exchange Commission…
NERC is ‘actively monitoring the grid’ following Iran-linked cyber threat
Hackers have disrupted critical U.S. infrastructure by targeting programmable logic controllers, the Cybersecurity and Infrastructure Security Agency warned. Source link
SAP NetWeaver exploitation enters second wave of threat activity
A second wave of cyberattacks is targeting a critical vulnerability in SAP NetWeaver Visual Composer, according to researchers. Following the initial round of threat activity…
Extortion campaign targeting Oracle E-Business Suite customers linked to zero-day
An email-based extortion campaign targeting Oracle E-Business Suite customers since early last week is now linked to a zero-day vulnerability, security researchers warned Sunday. The…
F5 supply-chain hack endangers more than 600,000 internet-connected devices
More than 600,000 F5 network security devices running the company’s flagship BIG-IP software are sitting unpatched on the internet one day after the company revealed…
Check Point Software confirms security incident but pushes back on threat actor claims
Check Point Software confirmed it was targeted in a recent hacking attempt after a threat actor offered to sell sensitive customer information on a dark…

