April 24, 2024
April 23, 2024
April 25, 2024
Google addressed four vulnerabilities in the Chrome web browser, including a critical vulnerability tracked as CVE-2024-4058. The vulnerability CVE-2024-4058 is a Type Confusion issue that resides in the ANGLE graphics layer engine. An attacker can exploit this vulnerability to execute […]
April 18, 2024
Threat actors are actively exploiting critical vulnerabilities in OpenMetadata to gain unauthorized access to Kubernetes workloads and leverage them for cryptocurrency mining activity. That’s according to the Microsoft Threat Intelligence team, which said the flaws have been weaponized since the […]
April 9, 2024
Back in January, we reported on a small security update patch for Windows 10 that brought on a lot of headaches for IT admins and brought on a veritable cavalcade of error codes. Microsoft promised a fix was in the […]
Threats & Malware, Vulnerabilities
April 22, 2024
Via: TechRadarThe not-for-profit research and development organization MITRE suffered a cyberattack early this year, with the attack apparently hindering some operations, but there was no talk of stolen data. In a breach notification published on the MITRE website late last week, […]
April 18, 2024
Via: Security AffairsIn late 2023, BlackBerry researchers spotted the threat actor FIN7 targeting a large US automotive manufacturer with a spear-phishing campaign. FIN7 targeted employees who worked in the company’s IT department and had higher levels of administrative rights. The attackers employed […]
April 17, 2024
Via: Dark ReadingTwo dangerous malware tools targeted at industrial control systems (ICS) and operating technology (OT) environments in Europe are the latest manifestations of the cyber fallout from the war in Ukraine. One of the tools, dubbed “Kapeka,” appears linked to Sandworm, […]
April 16, 2024
Via: CSO OnlineYour company’s intellectual property—whether that’s patents, trade secrets or just employee know-how—may be more valuable than your physical assets. Here’s to establish basic policies and procedures for IP protection. Intellectual property (IP) is the lifeblood of every organization. It didn’t […]
Mobile, Mobile security, Threats & Malware, Virus & Malware
April 15, 2024
Via: The Hacker NewsCybersecurity researchers have discovered a “renewed” cyber espionage campaign targeting users in South Asia with the aim of delivering an Apple iOS spyware implant called LightSpy. “The latest iteration of LightSpy, dubbed ‘F_Warehouse,’ boasts a modular framework with extensive spying […]
April 15, 2024
Via: Security AffairsIndustrial and enterprise IoT cybersecurity firm Claroty reported that the Ukrainian Blackjack hacking group claims to have damaged emergency detection and response capabilities in Moscow and beyond the Russian capital using a destructive ICS malware dubbed Fuxnet. The Blackjack group […]
April 17, 2024