Author Archives: Onsite Computing, Inc.

CISA Adds Twilio Authy and IE Flaws to Exploited Vulnerabilities List

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two security flaws to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The vulnerabilities are listed below – CVE-2012-4792 (CVSS score: 9.3) – Microsoft Internet Explorer Use-After-Free Vulnerability CVE-2024-39891 (CVSS score: 5.3) – Twilio Authy Information Disclosure

ICS malware FrostyGoop disrupted heating in Ukraine, remains threat to OT worldwide

Security researchers warn about a new malware threat designed to interact with industrial control systems (ICS) over the Modbus protocol. The malicious program was used in January in a cyberattack that left hundreds of buildings from the city of Lviv in Ukraine without central heating during freezing temperatures. Industrial cybersecurity firm Dragos found samples of […]

ICS malware FrostyGoop disrupted heating in Ukraine, remains threat to OT worldwide

Security researchers warn about a new malware threat designed to interact with industrial control systems (ICS) over the Modbus protocol. The malicious program was used in January in a cyberattack that left hundreds of buildings from the city of Lviv in Ukraine without central heating during freezing temperatures. Industrial cybersecurity firm Dragos found samples of […]

This site uses cookies to offer you a better browsing experience. By browsing this website, you agree to our use of cookies.