Magnet Goblin Hacker Group Leveraging 1-Day Exploits to Deploy Nerbian RAT

Mar 11, 2024NewsroomZero-Day / Endpoint Security A financially motivated threat actor called Magnet Goblin is swiftly ...

Canva Warns of Three Security Vulnerabilities in Fonts

The first, CVE-2023-45139, involved a high-severity bug in the FontTools library. The second and third vulnerabilities, ...

Tycoon and Storm-1575 Linked to Phishing Attacks on US Schools

Tycoon and Storm-1575 groups are identified as key players, with Tycoon offering MFA bypass as a service and Storm-1575 ...

Flaws in public records management tool could let hackers nab sensitive data linked to requests

A popular tool used by numerous state and local governments to manage public records requests contained defects that ...

New Malware Campaign Found Exploiting Stored XSS in Popup Builder < 4.2.3

In January, my colleague reported about a new Balada Injector campaign found exploiting a recent vulnerability in the ...

CISA adds Apple iOS and iPadOS memory corruption bugs to its Known Exploited Vulnerabilities Catalog

CISA adds Apple iOS and iPadOS memory corruption bugs to its Known Exploited Vulnerabilities Catalog Pierluigi Paganini ...

Microsoft Confirms Russian Hackers Stole Source Code, Some Customer Secrets

Mar 09, 2024NewsroomCyber Attack / Threat Intelligence Microsoft on Friday revealed that the Kremlin-backed threat ...

Law Enforcement Personnel Say LexisNexis Retaliated When Asked to Remove Data

More than 18,000 New Jersey law enforcement personnel are alleging that LexisNexis retaliated against them by freezing ...

1 329 330 331 332 333 334 335 336 337 338 339 697