Posts by admin
Intrusions targeting I-O Data router zero-days underway
Ongoing attacks leveraging a trio of zero-day flaws impacting I-O Data routers were disclosed by the Japanese computer peripheral produ...
Unauthorized file access possible with chained Mitel MiCollab flaws
Intrusions leveraging CVE-2024-41713, which stems from insufficient input validation in MiCollab's NuPoint Unified Messaging component,...
Alleged Scattered Spider hacker arrested, indicted
Nearly 150 employees of the financial entity have been compromised by Ogletree in a phishing campaign between October and November 2023...
Semperis InFocus with Mickey Bresman
In this SC Media InFocus, Security Weekly News' Adrian Sanabria discusses improving cyber defenses against ransomware with Semperis' Mi...
Deloitte, e-Tattoos, Cp3o, Chemonics, IPv6, 6, Chinese Emperors, Aaran Leyland… – SWN #435
Deloitte, e-Tattoos, Cp3o, Chemonics, IPv6, 6, Chinese Emperors, Aaran Leyland... - SWN #435
Source link
ML clients, ‘safe’ model formats exploitable through open-source AI vulnerabilities
Several open-source machine learning (ML) tools contain vulnerabilities that can lead to client-side malicious code execution or path t...
FCC to telecoms: Secure your networks from hacks like China’s Salt Typhoon
The Federal Communications Commission (FCC) on Dec. 5 responded to recent reports that the Chinese group Salt Typhoon infiltrated at le...
Supply chain attack compromises Solana Web3.js library
Impacted by the attack were versions 1.95.6 and 1.95.7 of the library, which were downloadable through for nearly five hours on Dec. 2 ...
Activity of novel DroidBot Android trojan ramps up
BleepingComputer reports that nearly 20 threat operations have already leveraged the newly emergent Turkish Android banking malware-as-...
Additional Pegasus spyware-hit devices identified
New infections of NSO Group's Pegasus spyware have been discovered by mobile threat hunting firm iVerify across seven of 2,500 scanned ...