CISA confirms critical Cleo bug exploitation in ransomware attacks
CISA confirmed today that a critical security vulnerability in Cleo Harmony, VLTrader, and LexiCom file transfer software is being exploited...
Read more →CISA confirmed today that a critical security vulnerability in Cleo Harmony, VLTrader, and LexiCom file transfer software is being exploited...
Read more →German agency BSI sinkholed a botnet of 30,000 devices infected with BadBox Pierluigi Paganini December 13, 2024 The German agency...
Read more →In a privilege escalation attack, an attacker gains elevated rights, permissions, or entitlements beyond the intended level associated with their...
Read more →Citrix Netscaler is the latest target in widespread password spray attacks targeting edge networking devices and cloud platforms this year to...
Read more →Across New Jersey, reports of mysterious drone sightings have been rising for weeks, with people contacting authorities and posting on...
Read more →SUMMARY Cybersecurity researcher Jeremiah Fowler discovered an unprotected Care1 database with over 4.8 million patient records. Exposed data included names,...
Read more →Dec 13, 2024Ravie LakshmananCyber Attack / Malware A now-removed GitHub repository that advertised a WordPress tool to publish posts to...
Read more →It’s that time of year where we, in the industry, attempt to be cyber soothsayers. A tall order – even...
Read more →Russian cyberspies Gamaredon has been discovered using two Android spyware families named ‘BoneSpy’ and ‘PlainGnome’ to spy on and steal...
Read more →Health Tech is booming, projected to grow from $312.92B in 2024 to $981.23B by 2032. Serhiy Tokarev highlights its social...
Read more →Russian telecommunications watchdog Roskomnadzor has blocked the Viber encrypted messaging app, used by hundreds of millions worldwide, for violating the...
Read more →Dec 13, 2024The Hacker NewsLinux / Vulnerability A security flaw has been disclosed in OpenWrt’s Attended Sysupgrade (ASU) feature that,...
Read more →