Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
SOC -CSIRT – Incidents & Attacks Notepad
Vendors & – MSSP Ecosystem
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
Home
SecurityAffairs.com
Page 36
SecurityAffairs.com
SecurityAffairs.com
How to Combat Insider Threats
Knowing that insider threats are a risk is one thing. Knowing how to fight them off...
SecurityAffairs.com
Hyundai suffered a data breach that impacted customers in France and Italy
Hyundai disclosed a data breach that impacted Italian and French car owners and clients who booked...
SecurityAffairs.com
QuaDream surveillance firm’s spyware targeted iPhones with zero-click exploit
At least five members of civil society worldwide have been targeted with spyware and exploits developed...
SecurityAffairs.com
SAP April 2023 security updates fix critical vulnerabilities
April 12, 2023 By Pierluigi Paganini SAP fixed two critical bugs that affect the Diagnostics Agent and the...
SecurityAffairs.com
OpenAI launched a bug bounty program
AI company OpenAI launched a bug bounty program and announced payouts of up to $20,000 for...
SecurityAffairs.com
Cybercrime group exploits Windows zero-day in ransomware attacks
Microsoft has addressed a zero-day in the Windows Common Log File System (CLFS) actively exploited in...
SecurityAffairs.com
A “By-Design” flaw in Microsoft Azure can allow storage accounts takeover
A flaw in Microsoft Azure could be exploited by attackers to gain access to storage accounts,...
SecurityAffairs.com
Yum! Brands, the owner of KFC, Taco Bell and Pizza Hut, discloses data breach
Yum! Brands, the company that owns the KFC, Pizza Hut, and Taco Bell brands, disclosed a...
SecurityAffairs.com
Apple released emergency updates to fix recently disclosed zero-day bugs on older devices
Apple released updates to backport patches addressing two actively exploited zero-day vulnerabilities in older iPhones, iPads, and...
SecurityAffairs.com
A cyber attack hit the water controllers for irrigating fields in the Jordan Valley
A cyber attack paralyzed the water controllers for irrigating fields in the Jordan Valley that are...
SecurityAffairs.com
CISA adds zero-day bugs in iPhones, Macs, and iPads to its Known Exploited Vulnerabilities catalog
US Cybersecurity and Infrastructure Security Agency (CISA) added two flaws in iPhones, Macs, and iPads to...
SecurityAffairs.com
SD Worx shuts down UK and Ireland services after cyberattack
Belgian HR giant SD Worx was forced to shut down its IT infrastructure for its UK...
SecurityAffairs.com
Sophos patches three issues in the Sophos Web Security appliance, one of them rated as critical
Sophos addressed three vulnerabilities in Sophos Web Appliance, including a critical flaw that can lead to...
SecurityAffairs.com
Iran-linked MERCURY APT behind destructive attacks on hybrid environments
Iran-linked APT group MERCURY is behind destructive attacks on hybrid environments masquerading as a ransomware operation. The...
SecurityAffairs.com
Samsung employees unwittingly leaked company secret data by using ChatGPT
Samsung employees have unwittingly leaked top secret data by providing them to the popular chatbot service...
SecurityAffairs.com
Researchers disclose critical sandbox escape bug in vm2 sandbox library
The development team behind the vm2 JavaScript sandbox library addressed a critical Remote Code Execution vulnerability....
SecurityAffairs.com
Security Affairs newsletter Round 414 by Pierluigi Paganini – International edition
Privacy Overview This website uses cookies to improve your experience while you navigate through the website....
SecurityAffairs.com
Estonian National charged with helping Russia acquire U.S. hacking tools and electronics
Andrey Shevlyakov, an Estonian national, was charged in the US with conspiracy and other charges related...
SecurityAffairs.com
CISA adds Veritas Backup Exec flaws to its Known Exploited Vulnerabilities catalog
US CISA has added Veritas Backup Exec flaws, which were exploited in ransomware attacks, to its...
SecurityAffairs.com
Apple addressed two actively exploited zero-day flaws
Apple released emergency security updates to address two actively exploited zero-day vulnerabilities impacting iPhones, Macs, and...
SecurityAffairs.com
MSI confirms security breach after Money Message ransomware attack
Multinational IT corporation MSI (Micro-Star International) confirms security breach after Money Message ransomware gang claimed the hack....
SecurityAffairs.com
Microsoft aims at stopping cybercriminals from using cracked copies of Cobalt Strike
Microsoft announced it has taken legal action to disrupt the illegal use of copies of the...
SecurityAffairs.com
Phishers migrate to Telegram
Experts warn that Telegram is becoming a privileged platform for phishers that use it to automate...
SecurityAffairs.com
Money Message ransomware group claims to have hacked IT giant MSI
Ransomware gang Money Message claims to have hacked the Taiwanese multinational IT corporation MSI (Micro-Star International). Ransomware gang Money...
SecurityAffairs.com
OCR Labs exposes its systems, jeopardizing major banking clients
A digital identification tool provided by OCR Labs to major banks and government agencies leaked sensitive...
SecurityAffairs.com
Threat Report Portugal: Q3 & Q4 2022
The Threat Report Portugal: H2 2022 compiles data collected on the malicious campaigns that occurred from...
SecurityAffairs.com
Analyzing attacks conducted by North Korea-linked ARCHIPELAGO APT group
Google’s Threat Analysis Group (TAG) warns of a North Korea-linked cyberespionage group tracked as ARCHIPELAGO. Google’s...
SecurityAffairs.com
Nexx bugs allow to open garage doors, and take control of alarms and plugs
A series of vulnerabilities in multiple smart devices manufactured by Nexx can be exploited to remotely...
SecurityAffairs.com
Tax preparation and e-file service eFile.com compromised to serve malware
The eFile.com online service, which is authorized by the US Internal Revenue Service (IRS), was spotted...
SecurityAffairs.com
HP would take up to 90 days to fix a critical bug in some business-grade printers
HP would take up to 90 days to address a critical flaw, tracked as CVE-2023-1707, that...
Posts navigation
1
…
35
36
37
Latest News
Data Breach Today
Ransomware Victims Who Pay a Ransom Drops to Record Low – Source: www.databreachtoday.com
19/04/2024
Data Breach Today
Lowest-Rung Attackers Challenging Ransomware-as-a-Service – Source: www.databreachtoday.com
19/04/2024
Data Breach Today
From $8.3B to $200M: Why Lacework Is Examining a Sale to Wiz – Source: www.databreachtoday.com
19/04/2024
Data Breach Today
Why Health Firms Struggle with Cybersecurity Frameworks – Source: www.databreachtoday.com
19/04/2024
Data Breach Today
Breach Roundup: LabHost Goes Down – Source: www.databreachtoday.com
19/04/2024
Data Breach Today
Live Webinar | CybeRx – How to Automatically Protect Rockwell OT Customers from Today’s Cyber-Attacks – Source: www.databreachtoday.com
19/04/2024