Cybersecurity researchers are warning about active exploitation attempts targeting a newly disclosed security flaw in Synacor’s Zimbra Collaboration. Enterprise security firm Proofpoint said it began observing the activity starting September 28, 2024. The attacks seek to exploit CVE-2024-45519, a severe security flaw in its postjournal service that could enable unauthenticated attackers to Go to Source […]
Author Archives: Onsite Computing, Inc.
A new set of malicious packages has been unearthed in the Python Package Index (PyPI) repository that masqueraded as cryptocurrency wallet recovery and management services, only to siphon sensitive data and facilitate the theft of valuable digital assets. “The attack targeted users of Atomic, Trust Wallet, Metamask, Ronin, TronLink, Exodus, and other prominent wallets in […]
The addition of Network Perception will provide Dragos with enhanced network visibility, compliance and segmentation analytics to the Dragos OT cybersecurity platform. Go to Source Author: Jeffrey Schwartz, Contributing Writer
T-Mobile must complete the move to zero trust and improve authentication, along with implementing better data minimization and improving asset inventory, said a US Federal Communications Commission (FCC) consent decree that the commission published on Monday. The settlement stems from a series of FCC investigations focused on three major T-Mobile data breaches in 2021, 2022, […]
The Browser Company has introduced an Arc Bug Bounty Program to encourage security researchers to report vulnerabilities to the project and receive rewards. […] Go to Source Author: Bill Toulas
The bug gives attackers a way to run arbitrary code on affected servers and take control of them. Go to Source Author: Jai Vijayan, Contributing Writer
Go to Source Author:
Go to Source Author:
Poor permission controls and user input validation is endemic to the platforms that protect Americans’ legal, medical, and voter data. Go to Source Author: Nate Nelson, Contributing Writer
