News
-
"Vulnerabilities Exposed Widely Used Solar Power Systems to Hacking, Disruption"Bitdefender researchers discovered serious vulnerabilities in widely used solar power systems that could allow attackers to cause blackouts.
-
"AWS Patches Vulnerabilities Potentially Allowing Account Takeovers"According to researchers at Aqua Security, Amazon Web Services (AWS) has patched critical vulnerabilities that could have been used to take over accounts.
-
"Over 40,000 Internet-Exposed ICS Devices Found in US: Censys"Censys found more than 40,000 Internet-exposed Industrial Control Systems (ICS) in the US. Over half of these systems are likely for building control and automation, and around 18,000 are used to control industrial systems.
-
"Chrome, Firefox Updates Patch Serious Vulnerabilities"Mozilla and Google recently updated their web browsers, and the latest versions patch several potentially serious vulnerabilities. Google updated Chrome to version 127.0.6533.99, which fixes six vulnerabilities, including a critical out-of-bo
-
"Windows Update Flaws Allow Undetectable Downgrade Attacks"SafeBreach Labs researcher Alon Leviev has highlighted significant gaps in Microsoft's Windows Update architecture, warning that hackers can execute software downgrade attacks and render "fully patched" meaningless on any Windows machine.
-
"Samsung Bug Bounty Program Payouts Reach $5M, Top Reward Increased to $1M"Samsung recently announced that it has paid out nearly $5 million through its bug bounty program since its launch in 2017, including $828,000 in 2023.
-
"Ransomware Attack Cost LoanDepot $27 Million"Mortgage lender LoanDepot recently reported that the costs associated with a ransomware attack that occured in January 2024, have reached nearly $27 million.
-
"Rockwell Controller Flaw Exposes Industrial Control Systems"Claroty's Team82 uncovered a security vulnerability in Rockwell Automation's ControlLogix 1756 devices that could expose critical infrastructure to cyberattacks on the Operational Technology (OT) controlling physical processes.
-
"CISA Releases Secure by Demand Guide"The US Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI) have released "Secure by Demand Guide: How Software Customers Can Drive a Secure Technology Ecosystem" to help organizations purchasing software un
-
"20K Ubiquiti IoT Cameras & Routers Are Sitting Ducks for Hackers"Check Point Research warns that over 20,000 Ubiquiti devices are exposed on the Internet, revealing informational data, including their platform names, configured IP addresses, and more, due to a five-year-old bug.
-
"Ransomware Gang Targets IT Workers With New RAT Masquerading as IP Scanner"The Ransomware-as-a-Service (RaaS) operator "Hunters International" is using a new Remote Access Trojan (RAT) named "SharpRhino." According to researchers at Quorum Cyber, the malware is delivered through a typosquatting domain impersonating the legiti
-
"North Korean Hackers Exploit VPN Update Flaw to Install Malware"According to South Korea's National Cyber Security Center (NCSC), Democratic People's Republic of Korea (DPRK) state-sponsored hackers have exploited vulnerabilities in a Virtual Private Network's (VPN) software update to install malware and infiltrate