Threats

Software Supply Chain: A Risky Time for Dependencies

The software supply chain is a critical element in the lifecycle of applications and websites. The interdependencies and components common in modern software development can increase the attack surf...

Critical F5 BIG-IP Flaw Actively Exploited by Hackers

User's of F5's BIG-IP application services could be vulnerable to a critical flaw that allows an unauthenticated attacker on the BIG-IP system to run arbitrary system commands, create or delete files...

Hackers Are Now Exploiting Windows Event Logs

Hackers have found a way to infect Windows Event Logs with fileless malware, security researchers have found. Kaspersky researchers on May 4 revealed “a new stash for fileless malware.” During a “...

New DNS Spoofing Threat Puts Millions of Devices at Risk

Security researchers have uncovered a critical vulnerability that could lead to DNS spoofing attacks in two popular C standard libraries that provide functions for common DNS operations. Nozomi Ne...

Security Researchers Find Nearly 400,000 Exposed Databases

Databases contain some of the most critical data in enterprises, so vulnerabilities in them are serious issues. Researchers at Singapore-based cybersecurity company Group-IB recently discovered tho...

Onyx Ransomware Destroys Large Files Instead of Locking Them

Ransomware just keeps getting worse, it seems. Cybersecurity researchers last week revealed that a new ransomware gang called Onyx is simply destroying larger files rather than encrypting them. As ...

Nimbuspwn: New Root Privilege Escalation Found in Linux

The Microsoft 365 Defender Research Team has revealed several new Linux vulnerabilities collectively dubbed "Nimbuspwn." Like the Dirty Pipe vulnerability, they only need a local user with low capabil...

Cybersecurity Agencies Reveal the Top Exploited Vulnerabilities of 2021

U.S. cybersecurity agencies joined their counterparts around the globe to urge organizations to address the top 15 vulnerabilities exploited in 2021. Topping the list were the Log4Shell vulnerabili...

How Hackers Use Reconnaissance – and How to Protect Against It

Information gathering is often the starting point of a cyberattack. For many hackers, before attempting anything they want to know who they’re dealing with, what vulnerabilities they might exploit, an...

WatchGuard, Windows Vulnerabilities Require Urgent Fixes

Vulnerabilities in WatchGuard firewalls and Microsoft Windows and Windows Server need to be patched and fixed immediately, security organizations said in alerts this week. The U.S. Cybersecurity an...

Latest articles