Newswires
May 13, 2024
Apple has recently applied security patches to older models of iPhones and iPads, addressing a zero-day vulnerability that was reportedly being exploited in targeted attacks.
May 13, 2024
Black Basta, a notorious ransomware group, has reportedly adopted a new vishing (voice phishing) technique to trick its victims.
May 10, 2024
A series of vulnerabilities in Telit Cinterion modems, commonly used in IoT devices across industries such as finance, telecoms, healthcare, and automotive, have been discovered, putting millions of devices at risk.
May 10, 2024
A new form of cyber attack, termed 'LLMjacking' by the Sysdig Threat Research Team, has been identified.
May 9, 2024
Poland has reported that a state-sponsored threat group connected to Russia's military intelligence service, known as the GRU, has been perpetrating cyberattacks on Polish government institutions throughout the week.
May 9, 2024
F5 Networks' BIG-IP Next Central Manager, a key component in managing F5's suite of software and hardware products for application delivery and security, has been found to have five vulnerabilities that could potentially allow an attacker to gain full control and create hidden accounts within any F5-branded assets.
May 9, 2024
This week, Citrix has notified its customers about a vulnerability in the PuTTY SSH client that could potentially enable attackers to steal the private SSH key of a XenCenter administrator.
May 9, 2024
Juniper Threat Labs has reported that unidentified threat actors are exploiting recently exposed vulnerabilities in Ivanti Connect Secure (ICS) to distribute the payload of the Mirai botnet.
May 8, 2024
F5 has rectified two serious vulnerabilities in its BIG-IP Next Central Manager, which, if exploited, could grant an attacker administrative control and the ability to establish hidden rogue accounts on any assets under management.
May 7, 2024
Hackers have been exploiting a flaw in an outdated version of the LiteSpeed Cache plugin used by WordPress sites to create administrator users and gain control of the sites.