Hackers Exploit OpenMetadata Flaws to Mine Crypto on Kubernetes
Apr 18, 2024NewsroomContainer Security / Cryptocurrency Threat actors are actively exploiting critical vulnerabilities in OpenMetadata to gain unauthorized access to...
Apr 18, 2024NewsroomContainer Security / Cryptocurrency Threat actors are actively exploiting critical vulnerabilities in OpenMetadata to gain unauthorized access to...
CISA adds D-Link multiple NAS devices bugs to its Known Exploited Vulnerabilities catalog Pierluigi Paganini April 11, 2024 U.S. Cybersecurity...
Apr 09, 2024NewsroomVulnerability / IoT Security Multiple security vulnerabilities have been disclosed in LG webOS running on its smart televisions...
Security Vulnerability of HTML Emails This is a newly discovered email vulnerability: The email your manager received and forwarded to...
Mandiant, the cybersecurity firm, today disclosed new findings on threat actors exploiting vulnerabilities in Ivanti Connect Secure appliances. The exploited...
A batch of new vulnerabilities has drawn a mea culpa from Ivanti’s CEO, and a promise to embrace secure-by-design methodologies. ...
Maybe the Phone System Surveillance Vulnerabilities Will Be Fixed It seems that the FCC might be fixing the vulnerabilities in...
Google fixed two actively exploited Pixel vulnerabilities Pierluigi Paganini April 03, 2024 Google addressed several vulnerabilities in Android and Pixel...
Exploited unpatched vulnerabilities are the leading root cause of successful attacks, as reported in Sophos’ 2024 Ransomware Report. The modern...
To deploy a ransomware attack, adversaries must first gain access to a victim’s corporate environment, devices, and data. Threat actors...
An abundance of successful cyberattacks in the final quarter of 2023 resulted from threat actors leveraging known and exploitable vulnerabilities,...
In a major new cybersecurity report released by Google and Mandiant, 97 zero-day vulnerabilities exploited in the wild were reported...
Mar 29, 2024NewsroomReverse Engineering / RFID Security Security vulnerabilities discovered in Dormakaba's Saflok electronic RFID locks used in hotels could...
Google: China dominates government exploitation of zero-day vulnerabilities in 2023 Pierluigi Paganini March 28, 2024 Google’s Threat Analysis Group (TAG)...
CISA adds Microsoft SharePoint bug disclosed at Pwn2Own to its Known Exploited Vulnerabilities catalog Pierluigi Paganini March 27, 2024 U.S....