VMware confirms critical vCenter flaw now exploited in attacks
VMware has confirmed that a critical vCenter Server remote code execution vulnerability patched in October is now under active exploitation....
Read more →VMware has confirmed that a critical vCenter Server remote code execution vulnerability patched in October is now under active exploitation....
Read more →Google says the ColdRiver Russian-backed hacking group is pushing previously unknown backdoor malware using payloads masquerading as a PDF decryption tool....
Read more →Infostealer malware is one of the most substantial and underappreciated risk vectors for corporate information security teams. Infostealers infect computers,...
Read more →CISA warns that a critical authentication bypass vulnerability in Ivanti’s Endpoint Manager Mobile (EPMM) and MobileIron Core device management software...
Read more →Ransomware actors are again using TeamViewer to gain initial access to organization endpoints and attempt to deploy encryptors based on...
Read more →Microsoft plans to provide Windows 11 users with almost instant access to photos and screenshots they’ve taken on their Android smartphones....
Read more →Kansas State University (K-State) announced it is managing a cybersecurity incident that has disrupted certain network systems, including VPN, K-State...
Read more →Appliances giant Haier issued a takedown notice to a software developer for creating Home Assistant integration plugins for the company’s...
Read more →The United States government has recommended that Conor Brian Fitzpatrick, the creator and lead administrator of the now-defunct BreachForums hacking...
Read more →A new campaign targeting vulnerable Docker services deploys an XMRig miner and the 9hits viewer app on compromised hosts, allowing...
Read more →Multiple Atlassian Jira products are experiencing an ongoing outage as of this morning. Users of Jira Work management, Jira Software,...
Read more →Security researchers found that infections with high-profile spyware Pegasus, Reign, and Predator could be discovered on compromised Apple mobile devices...
Read more →