U.S. CISA adds Acclaim Systems USAHERDS flaw to its Known Exploited Vulnerabilities catalog Pierluigi Paganini December 23, 2024 U.S. Cybersecurity and…
Adobe has released out-of-band security updates to address a critical ColdFusion vulnerability with proof-of-concept (PoC) exploit code. In an advisory released…
KEY SUMMARY POINTS Focus Shift to Nuclear Industry: The Lazarus Group, linked to North Korea, has shifted its targets to…
The Federal Trade Commission (FTC) has ordered Marriott International and Starwood Hotels to define and implement a robust customer data…
Two WordPress plugins required by the premium WordPress WPLMS theme, which has over 28,000 sales, are vulnerable to more than a dozen…
A U.S. federal judge has ruled that Israeli spyware maker NSO Group violated U.S. hacking laws by using WhatsApp zero-days…
A newly discovered vulnerability, dubbed “G-Door,” allows malicious actors to circumvent Microsoft 365 security measures by exploiting unmanaged Google Docs…
Lazarus Group Targets Nuclear Power Organizations with Sophisticated Malware Campaign The Lazarus Group, a well-known hacking collective widely believed to…
U.S. Court rules against NSO Group in WhatsApp spyware Lawsuit Pierluigi Paganini December 23, 2024 A U.S. court ruled in…
Cybersecurity threats are increasingly targeting vulnerabilities in publicly exposed assets like VPNs and firewalls, exploited by various actors, including APT…
A new Microsoft 365 phishing-as-a-service platform called “FlowerStorm” is growing in popularity, filling the void left behind by the sudden shutdown of…
A joint Cybersecurity Advisory (CSA) warns of ongoing exploitation attempts by Iranian Islamic Revolutionary Guard Corps (IRGC)-affiliated cyber actors using…











