Brace of Icinga web vulnerabilities ‘easily chained’ to hack IT monitoring software
Open source IT monitoring system gets patched [...]
Open source IT monitoring system gets patched [...]
Botnet operator had thousands of hacked credential listings, according to the DoJ [...]
Five years since WannaCry exploded onto the scene, ransomware still tops global threat lists ANALYSIS Five years ago today (May 12), a ransomware attack blamed on a North Korean hacking group hit comp [...]
Conti, Lockbit, and other prolific ransomware strains apparently have similar vulnerabilities [...]
Attack technique bypasses email filters and burnishes credibility of phishing links [...]
Technology interoperability at risk from wider conflict between China and the West [...]
The ‘Russian alternative to YouTube’ has been offline since Monday [...]
‘A comprehensive tool that can take you from crawl to walk to run’ [...]
War in Ukraine and ransomware trends top the agenda at this year’s NCSC conference [...]
Suspected DDoS attack took place one hour before Russia invaded Ukraine [...]
Threat landscape’s increasing complexity adds impetus to drive for consistency across 27 member states [...]
Government sets out plan for post-quantum encryption [...]
Users should patch immediately [...]
Attackers pounce before site owners can activate the installation wizard [...]
NCSC proposes new code of conduct for app stores [...]
Hack investigation blames compromised token for breach [...]
Reporting window is 66 hours shorter than that stipulated under the EU’s GDPR [...]
Attackers could use the flaw to steal credentials with no authentication required [...]
Unpatched flaw caused by the predictability of transaction IDs [...]
Bar suspends website after mystery assault [...]
Patches issued for vulnerabilities arising from misuse of NanoSSL TLS library [...]
Difficult-to-exploit ESAPI vulnerability offers best practice lessons [...]
Difficult-to-exploit ESAPI vulnerability offers best practice lessons [...]
Unknown actor accessed employee emails [...]
Faulty invitation mechanism enabled ‘package planting’ attacks [...]