Hackers Using Azure and AWS to Spread RATs
Researchers from Cisco Talos Intelligence found that hackers are using public cloud providers like Azure and AWS to spread RATs.
These cloud services allow them...
53% of Connected Medical Devices Have Serious Vulnerabilities
Critical device risks in hospital environments leave hospitals and patients vulnerable to cyber-attacks and data security issues.
Cyberio, in its 2022 "State of Healthcare IoT...
13 Known Exploited Vulnerabilities Added to CISA Catalog
CISA has added 13 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence that threat actors are actively exploiting the vulnerabilities listed...
515,000 People Affected By Red Cross Data Breach
TheCISO -
As revealed on Wednesday, over 515,000 people are affected by the Red Cross data breach incident. The International Committee of the Red Cross (ICRC)...
Suspected Hacker Attack on Greek Parliament
A temporary shutdown of the legislature's web mail followed the hack of 60 Greek Parliament emails on Friday.
According to a Parliament briefing on the...
CISCO Recently Patched Critical Vulnerabilities
TheCISO -
Cisco has patched a pair of vulnerabilities in its telco-focused Cisco Redundancy Configuration Manager (RCM) for Cisco StarOS software, including a critical flaw that...
IT Company Fined for Massive Data Breach of Voters Information
TheCISO -
An IT firm responsible for a massive leak of voter data has been fined €65,000 for data breaches.
An administrative penalty against C-Planet IT Solutions...
You Need to Patch Windows Remote Desktop Vulnerability Now
TheCISO -
CyberArk researched discovered a Windows Remote Desktop (RDP) vulnerability tracked as CVE-2022-21893, which you need to patch now!
Vulnerability Description
This vulnerability enables any standard unprivileged...
Microsoft Defender Vulnerability Remains Unpatched
TheCISO -
A vulnerability has been discovered that could make it easy for hackers to circumvent Microsoft Defender protective function.
Microsoft Defender allows hackers to bypass malware...
New Safari Vulnerability Can Leak Recent Browsing History and Some of your Google Account Information
TheCISO -
A new Safari vulnerability disclosed by FingerprintJS, can leak recent browsing history and some information of your logged-in Google account.
The bug was introduced in...
What are Dependency Confusion Attacks?
TheCISO -
A dependency confusion attack (or supply chain attack) occurs when a software installer script is tricked into pulling malicious code file from a public...
Huge Increase of WordPress Vulnerabilities in 2021
Riskbased Security researchers revealed a huge increase of WordPress vulnerabilities in 2021 in their latest research.
10,359 vulnerabilities were reported to affect third-party WordPress...