Pwn2Own contest concludes with nearly $1m paid out to ethical hackersWhich is pocket change compared to what criminals will pay for zero-days, but thankfully community spirit...
Day: December 20, 2022
Researchers smell a cryptomining Chaos RAT targeting Linux systems
Researchers smell a cryptomining Chaos RAT targeting Linux systemsSmells like Russian miscreants A type of cryptomining malware targeting Linux-based systems has added capabilities by incorporating an...
Apple should pay €6m to French data watchdog for tracking users without consent, says official
Apple should pay €6m to French data watchdog for tracking users without consent, says officialRecommendation from top CNIL advisor claims Cupertino broke EU privacy laws Apple...
Uber staff info leaks after supplier Teqtivity gets pwned
Uber staff info leaks after supplier Teqtivity gets pwnedThankfully no customer info – but the spotlight is back on third-party attacks Uber, which has suffered a...
LockBit threatens to leak confidential info stolen from California’s beancounters
LockBit threatens to leak confidential info stolen from California's beancountersDatabases, details of 'sexual proceedings in court' and more apparently pilfered from finance IT LockBit claims it...
Microsoft ain’t the only one squashing exploited-in-the-wild bugs this month
Microsoft ain't the only one squashing exploited-in-the-wild bugs this monthPlus there's a PoC for this unpatched Cisco bug Patch Tuesday For its final Patch Tuesday of...
Top 5 Tips for Choosing Endpoint Security
Top 5 Tips for Choosing Endpoint SecurityFollowing years now of digital transformation, cloud migration and deployment of hybrid workforces, enterprises have more endpoints than ever. Which...
Citrix patches critical ADC flaw the NSA says is already under attack from China
Citrix patches critical ADC flaw the NSA says is already under attack from ChinaYet more pain for the software formerly known as NetScaler The China-linked crime...
Healthcare: Essential Defenses for Combating Ransomware
Healthcare: Essential Defenses for Combating RansomwareMove Infrastructure to the Cloud and Hone Incident Response Plans, Experts SayTo avoid having to even consider paying a ransom, experts...
EU takes another step towards US data-sharing agreement
EU takes another step towards US data-sharing agreementCampaigners say it's unlikely to pass a test in the courts, though The EU has issued a draft decision...
Chinese Hackers Exploit Citrix Vulnerabilities
Chinese Hackers Exploit Citrix VulnerabilitiesHealth Sector Entities Urged to Patch Citrix ADC, Gateway FlawsChinese hackers are exploiting known vulnerabilities in a Citrix networking appliance and virtual...
Microsoft Vulnerability Upgraded to Critical Due to RCE Risk
Microsoft Vulnerability Upgraded to Critical Due to RCE RiskCode-Execution Bug Has Broader Scope that Flaw Exploited by EternalBlue, IBM SaysMicrosoft upgraded a vulnerability first discovered in...