Samsung has patched a remote code execution vulnerability that was exploited in zero-day attacks targeting its Android devices. […] Go to Source Author: Sergiu Gatlan
Category Archives: Security
U.S. Senator Ron Wyden has sent a letter to the Federal Trade Commission (FTC) requesting the agency to investigate Microsoft for failing to provide adequate security in its products, which led to ransomware attacks against healthcare organizations. […] Go to Source Author: Bill Toulas
Apple warned customers last week that their devices were targeted in a new series of spyware attacks, according to the French national Computer Emergency Response Team (CERT-FR). […] Go to Source Author: Sergiu Gatlan
Panama’s Ministry of Economy and Finance (MEF) has disclosed that one of its computers may have been compromised in a cyberattack.. […] Go to Source Author: Bill Toulas
Microsoft Teams will automatically alert users when they send or receive a private message containing links that are tagged as malicious. […] Go to Source Author: Sergiu Gatlan
The Akira ransomware gang is actively exploiting CVE-2024-40766, a year-old critical-severity access control vulnerability, to gain unauthorized access to SonicWall devices. […] Go to Source Author: Bill Toulas
A new Spectre-like attack dubbed VMScape allows a malicious virtual machine (VM) to leak cryptographic keys from an unmodified QEMU hypervisor process running on modern AMD or Intel CPUs. […] Go to Source Author: Bill Toulas
Browser extensions boost productivity—but also open the door to hidden risks like data exfiltration and AitM attacks. Keep Aware’s Buyer’s Guide shows how to gain visibility, enforce policies, and block risky add-ons in real time. […] Go to Source Author: Sponsored by Keep Aware
A DDoS mitigation service provider in Europe was targeted in a massive distributed denial-of-service attack that reached 1.5 billion packets per second. […] Go to Source Author: Bill Toulas
The largest supply-chain compromise in the history of the NPM ecosystem has impacted roughly 10% of all cloud environments, but attackers made little profit off it. […] Go to Source Author: Bill Toulas
