Linux Kernel Bug Opens Door to Wider Cyberattacks
The information-disclosure flaw allows KASLR bypass and the discovery of additional, unpatched vulnerabilities in ARM devices. [...]
The information-disclosure flaw allows KASLR bypass and the discovery of additional, unpatched vulnerabilities in ARM devices. [...]
The gaming- and AI-friendly graphics accelerators can open the door to a range of cyberattacks. [...]
The malware is for now using exploits for the Microsoft Exchange "ProxyLogon" security bugs to install Monero-mining malware on targets. [...]
The ransomware is upping its danger quotient with new features while signaling a rebranding to "AstroLocker." [...]
Usage is way up, but so are cyberattacks: Mobile phishing, malware, banking heists and more can come from just one wrong scan. [...]
CVE-2021-22893 allows remote code-execution (RCE) and is being used in the wild by nation-state cyberattackers to compromise VPN appliances in defense, finance and government orgs. [...]
The malware seems like a silly coding lark at first, but further exploration shows it can wreak serious damage in follow-on attacks. [...]
Our new eBook goes beyond the status quo to take a look at the evolution of ransomware and what to prepare for next. [...]
Two cyberattack campaigns are making the rounds using unique social-engineering techniques. [...]
Widely deployed platforms from Citrix, Fortinet, Pulse Secure, Synacor and VMware are all in the crosshairs of APT29, bent on stealing credentials and more. [...]
The IoT-targeted malware has also added new exploits for initial compromise, for Huawei, Realtek and Dasan GPON devices. [...]
The vulnerability is triggered when a cloud container pulls a malicious image from a registry. [...]
In a veritable cyber-SWAT action, the Feds remotely removed the infections without warning businesses beforehand. [...]
Crooks are looking to harvest email credentials with a savvy campaign that uses the Typeform service to host the phishing page. [...]
The security bugs could open the door for arbitrary code-execution and full takeover of targeted machines. [...]
A man caught in an FBI sting allegedly said he wanted to destroy "70 percent of the internet" by going after the tech giant's data centers. [...]
Attackers are filling out and submitting web-based "contact us" forms, thus evading email spam filters. [...]
The database was subsequently leaked elsewhere, imperiling consumers from the U.S. and around the world. [...]
The database was subsequently leaked elsewhere, imperiling consumers from the U.S. and around the world. [...]
Cybercriminals are encouraging users to send the "offers" via WhatsApp to their friends as well. [...]
A widespread email campaign using malicious Microsoft Excel attachments and Excel 4 macros is delivering IcedID at high volumes, suggesting it's filling the Emotet void. [...]
Microsoft's cloud-container technology allows attackers to directly write to files, researchers said. [...]
The wormable malware spread from Android to Android by sending messages offering free Netflix Premium for 60 days. [...]
CVE-2021-21982 affects a platform designed to secure private clouds, and the virtual servers and workloads that they contain. [...]
Cyberattackers are actively exploiting known security vulnerabilities in widely deployed, mission-critical SAP applications, allowing for full takeover and the ability to infest an organization further. [...]