The MANGA (aka Dark Mirai) botnet operators have been discovered abusing a new vulnerability in the TP-Link TL-WR840N EU V5 that allows remote code execution. The abused flaw Botnets...
Moobot has been exploiting a critical flaw in Hikvision products, which were sanctioned by the U.S. in the wake of human rights abuse. The botnet is based...
Key U.S. allies supported the effort but did not sign on to a joint statement committing to the creation of a code of conduct on how...
Officials in the public and private sectors warned of the need to enact a robust cybersecurity posture at the federal level ahead of growing ransomware and...
A Russian national has been sentenced to 48 months in prison for operating a “crypting” service used to conceal the Kelihos malware from antivirus software, enabling...
UPDATED The maintainers of popular Java logging library Apache Log4j have rushed out a patch for a critical vulnerability that could lead to remote code execution (RCE)...
Cloud sprawl happens when development teams spin up new cloud resources, forget about them, then move on to the next urgent task. Migrating to the cloud...
Ethical hackers have reported over 66,000 valid vulnerabilities through HackerOne this year, an increase of 22% from 2020. The annual Hacker-Powered Security Report from bug bounty platform HackerOne, published on...
The Australian Cyber Security Centre (ACSC) says Conti ransomware attacks have targeted multiple Australian organizations from various industry verticals since November. “The ACSC is aware of...
A sophisticated cybercrime group who has been quietly working from the shadows has had its tactics and procedures exposed by researchers who tracked recent cyberattacks conducted...
Recent Comments