2000+ Palo Alto Firewalls Hacked Exploiting New Vulnerabilities
Over 2,000 Palo Alto Networks firewalls have been compromised in a widespread attack exploiting recently patched vulnerabilities. The attack, which...
Read more →Over 2,000 Palo Alto Networks firewalls have been compromised in a widespread attack exploiting recently patched vulnerabilities. The attack, which...
Read more →Halo Security, a leader in external attack surface management and penetration testing, has announced the launch of its new Slack®...
Read more →A critical vulnerability in AnyDesk, a popular remote desktop application, has been discovered that could allow attackers to expose users’...
Read more →Persistence mechanisms play a critical role in modern cyberattacks, helping malware remain active on compromised systems even after reboots, log-offs,...
Read more →Threat actors are actively using a new cash-out technique called “Ghost Tap” to cash out money using credit card information...
Read more →Multiple decade-old Local Privilege Escalation (LPE) vulnerabilities discovered within the needrestart component installed by default in Ubuntu Server might allow...
Read more →A new Linux backdoor named WolfsBane has been recently uncovered by the ESET researchers, attributed to the Gelsemium advanced persistent...
Read more →The cybersecurity community is on high alert following the discovery of five critical Local Privilege Escalation (LPE) vulnerabilities in the...
Read more →The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical warning regarding two newly discovered vulnerabilities in VMware’s vCenter...
Read more →Federal authorities have unveiled criminal charges against 5 individuals accused of directing a sophisticated phishing scheme targeting employees of companies...
Read more →Kaspersky’s Global Research and Analysis Team (GReAT) has recently uncovered a sophisticated supply chain attack targeting the Python Package Index...
Read more →A high-severity security vulnerability in Kubernetes has been discovered, potentially allowing attackers to execute arbitrary commands beyond container boundaries. The...
Read more →