CISA Issues New Advisory for Industrial Control Systems
The Cybersecurity and Infrastructure Security Agency (CISA) has released a new advisory concerning a critical vulnerability in industrial control systems...
Read more →The Cybersecurity and Infrastructure Security Agency (CISA) has released a new advisory concerning a critical vulnerability in industrial control systems...
Read more →Hackers target vaults, buckets, and secrets to access some of the most classified and valuable information, including API keys, logins,...
Read more →CDK Global has cautioned customers about unscrupulous actors calling them and posing as CDK agents or affiliates to gain unauthorized systems access....
Read more →A cyber-attack on London hospitals resulted in the publication of sensitive data stolen from Synnovis, a National Health Service (NHS)...
Read more →Two critical vulnerabilities (CVE-2024-31204 and CVE-2024-30270) affecting Mailcow versions before 2024-04 allow attackers to execute arbitrary code on the server....
Read more →Jun 21, 2024NewsroomMalware / Malvertising A malvertising campaign is leveraging trojanized installers for popular software such as Google Chrome and...
Read more →Cybercriminals in password theft are constantly developing new ways to deliver phishing emails. They’ve learned to use a legitimate Facebook...
Read more →A new botnet named Zergeca has emerged, showcasing advanced capabilities that set it apart from typical Distributed Denial of Service...
Read more →The US Department of Commerce has announced an upcoming US-wide ban of cybersecurity and antivirus software by Kaspersky, as its...
Read more →Jun 21, 2024NewsroomVulnerability / Data Protection A recently patched high-severity flaw impacting SolarWinds Serv-U file transfer software is being actively...
Read more →Russia-linked APT Nobelium targets French diplomatic entities Pierluigi Paganini June 21, 2024 French information security agency ANSSI reported that Russia-linked...
Read more →Hackers often abuse DNS and ICMP tunneling to transmit data and bypass network security measures covertly. All these protocols, which...
Read more →