We are glad to present the most recent news on cybersecurity in this week’s Threat and Vulnerability Roundup from Cyber...
VMware addressed a critical vRealize Log Insight security vulnerability that allows remote attackers to gain remote execution on vulnerable appliances. Now known as VMware Aria Operations for...
The Department of Health and Human Services issued three new online resources for health care entities to fortify their digital networks. The Department of Health and...
Prosecutors unveiled charges Monday against a “troll farm” and Chinese nationals who worked with a Zoom employee to crash meetings with U.S.-based dissidents. A “secret police...
The bipartisan, bicameral legislation directs CISA to provide primary and secondary schools with more targeted cyber information and resources to combat a rise in ransomware attacks....
The Department of Homeland Security components are working more closely than ever to understand emerging technologies’ prospects and threats. The Department of Homeland Security’s Cybersecurity and...
A joint effort between the U.S., U.K., Australia, Canada and New Zealand yielded recommendations to prevent cyber attacks on increasingly digital infrastructure. As municipal infrastructure becomes...
The Chinese-based Video surveillance equipment manufacturer has disclosed a critical flaw in their storage products, allowing threat actors to obtain admin permissions. This flaw can be...
Beware of the latest phishing campaigns that distribute the QBot malware via PDFs and Windows Script Files (WSF) to infiltrate your Windows devices. Qbot (aka QakBot, QuackBot,...
The car thieves are employing the out-of-date Nokia 3310 phone to access cars through hacking. This new approach is among the significant and distinctive incidents recorded...
Morphisec Threat Labs researchers have recently exposed a sneaky loader called “in2al5d p3in4er” (Invalid Printer) that delivers Aurora information stealer malware through YouTube videos. Using an...
Recent Comments