6 Actively Exploited Zero-Days and 132 Flaws Patched
A total of 132 new security flaws in Microsoft’s products were patched, including six zero-day issues that the company claimed were...
Read more →A total of 132 new security flaws in Microsoft’s products were patched, including six zero-day issues that the company claimed were...
Read more →SonicWall has recently published a security notice in which 15 vulnerabilities were fixed. CVEs for these vulnerabilities have been published,...
Read more →Zoom has released security patches for 6 high and 1 low severity vulnerabilities, allowing threat actors to escalate privileges and...
Read more →Citrix has released security advisories for critical and high-severity vulnerabilities, which could allow threat actors to escalate their privileges if...
Read more →Jul 13, 2023THNOT/ICS, SCADA Cybersecurity The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has alerted of two security flaws impacting...
Read more →Several of the UK’s largest comms providers are collaborating on a sustainability initiative that is geared towards curbing telco supply...
Read more →The 8BASE ransomware group has claimed responsibility for attacking seven new victims and listing them on their dark web portal....
Read more →A self-signed China-originated Rootkit acts as a universal downloader targeting gaming sectors to exfiltrate sensitive information. The threat actors abuse...
Read more →Storm-0978, a threat actor, actively targeted European and North American defense and government entities in a phishing campaign. Exploiting CVE-2023-36884,...
Read more →An unnamed advanced persistent threat (APT) group has set its sights on two Rockwell Automation product vulnerabilities that they could...
Read more →Siemens and Schneider Electric published nine new security warnings that together addressed 50 vulnerabilities impacting its industrial devices. Recently, Schneider Electric...
Read more →As per the research conducted by SentinelOne, a new risk has been identified, which affects the information security researchers as...
Read more →