CISA adds Cisco NX-OS Command Injection bug to its Known Exploited Vulnerabilities catalog

The flaw allows an attacker to execute arbitrary commands as root on the affected device’s operating system. Only ...

Cybersecurity Agencies Warn of China-linked APT40’s Rapid Exploit Adaptation

Cybersecurity agencies from Australia, Canada, Germany, Japan, New Zealand, South Korea, the U.K., and the U.S. have ...

Trojanized jQuery Packages Found on npm, GitHub, and jsDelivr Code Repositories

Unknown threat actors have been found propagating trojanized versions of jQuery on npm, GitHub, and jsDelivr in what ...

New APT Group “CloudSorcerer” Targets Russian Government Entities

A previously undocumented advanced persistent threat (APT) group dubbed CloudSorcerer has been observed targeting ...

Dark Web Malware Logs Expose 3,300 Users Linked to Child Abuse Sites

An analysis of information-stealing malware logs published on the dark web has led to the discovery of thousands of ...

Indian Government Issues Serious Warning on Phishing Scams Alleging Sexual Offenses

The emails falsely accuse recipients of sexual offences, using names and seals of authorities to appear authentic. ...

New Ransomware-as-a-Service ‘Eldorado’ Targets Windows and Linux Systems

An emerging ransomware-as-a-service (RaaS) operation called Eldorado comes with locker variants to encrypt files on ...

Decryptor for DoNex, Muse, DarkRace, (fake) LockBit 3.0 Ransomware Released

Avast researchers have identified a cryptographic weakness in the DoNex ransomware and its previous versions, enabling ...

1 143 144 145 146 147 148 149 150 151 152 153 664