16.5 C
Munich
Saturday, May 4, 2024

News

Hackers Using Azure and AWS to Spread RATs

Researchers from Cisco Talos Intelligence found that hackers are using public cloud providers like Azure and AWS to spread RATs. These cloud services allow them...

53% of Connected Medical Devices Have Serious Vulnerabilities

Critical device risks in hospital environments leave hospitals and patients vulnerable to cyber-attacks and data security issues. Cyberio, in its 2022 "State of Healthcare IoT...

13 Known Exploited Vulnerabilities Added to CISA Catalog

CISA has added 13 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence that threat actors are actively exploiting the vulnerabilities listed...

515,000 People Affected By Red Cross Data Breach

As revealed on Wednesday, over 515,000 people are affected by the Red Cross data breach incident. The International Committee of the Red Cross (ICRC)...

Suspected Hacker Attack on Greek Parliament

A temporary shutdown of the legislature's web mail followed the hack of 60 Greek Parliament emails on Friday. According to a Parliament briefing on the...

CISCO Recently Patched Critical Vulnerabilities

Cisco has patched a pair of vulnerabilities in its telco-focused Cisco Redundancy Configuration Manager (RCM) for Cisco StarOS software, including a critical flaw that...

IT Company Fined for Massive Data Breach of Voters Information

An IT firm responsible for a massive leak of voter data has been fined €65,000 for data breaches. An administrative penalty against C-Planet IT Solutions...

You Need to Patch Windows Remote Desktop Vulnerability Now

CyberArk researched discovered a Windows Remote Desktop (RDP) vulnerability tracked as CVE-2022-21893, which you need to patch now! Vulnerability Description This vulnerability enables any standard unprivileged...

Microsoft Defender Vulnerability Remains Unpatched

A vulnerability has been discovered that could make it easy for hackers to circumvent Microsoft Defender protective function. Microsoft Defender allows hackers to bypass malware...

New Safari Vulnerability Can Leak Recent Browsing History and Some of your Google Account Information

A new Safari vulnerability disclosed by FingerprintJS, can leak recent browsing history and some information of your logged-in Google account. The bug was introduced in...

What are Dependency Confusion Attacks?

A dependency confusion attack (or supply chain attack) occurs when a software installer script is tricked into pulling malicious code file from a public...

Huge Increase of WordPress Vulnerabilities in 2021

Riskbased Security researchers revealed a huge increase of WordPress vulnerabilities in 2021 in their latest research. 10,359 vulnerabilities were reported to affect third-party WordPress...

Latest