Critical Cisco Switch Vulnerabilities Allow Remote Exploitation
The web-based user interface of some Cisco Small Business Series Switches contains multiple vulnerabilities, according to a warning from Cisco.Cisco lists four critical remote...
WebKit Under Attack: Apple Issues Emergency Patches for 3 New Zero-Day Vulnerabilities
May 19, 2023Ravie LakshmananZero-Day / Endpoint Security
Apple on Thursday rolled out security updates to iOS, iPadOS, macOS, tvOS, watchOS, and the Safari web...
Apple Thwarts $2 Billion in App Store Fraud, Rejects 1.7 Million App Submissions
May 18, 2023Ravie LakshmananMobile Security / App Sec
Apple has announced that it prevented over $2 billion in potentially fraudulent transactions and rejected roughly...
8220 Gang Exploiting Oracle WebLogic Flaw to Hijack Servers and Mine Cryptocurrency
May 18, 2023Ravie LakshmananCryptocurrency / Server Security
The notorious cryptojacking group tracked as 8220 Gang has been spotted weaponizing a six-year-old security flaw in...
Escalating China-Taiwan Tensions Fuel Alarming Surge in Cyber Attacks
May 18, 2023Ravie LakshmananCyber War / Threat Intel
The rising geopolitical tensions between China and Taiwan in recent months have sparked a noticeable uptick...
Researchers Uncovered QakBot Malware C2 Infrastructure
Tam Cymru researchers have recently revealed noteworthy patterns and irregularities from their continuous monitoring of QakBot’s command and control infrastructure. The researchers shared high-level insights...
This Cybercrime Syndicate Pre-Infected Over 8.9 Million Android Phones Worldwide
A cybercrime enterprise known as Lemon Group is leveraging millions of pre-infected Android smartphones worldwide to carry out their malicious operations, posing significant...
Zero Trust + Deception: Join This Webinar to Learn How to Outsmart Attackers!
May 18, 2023The Hacker NewsCybersecurity Webinar
Cybersecurity is constantly evolving, but complexity can give hostile actors an advantage. To stay ahead of current and...
How to Reduce Exposure on the Manufacturing Attack Surface
Digitalization initiatives are connecting once-isolated Operational Technology (OT) environments with their Information Technology (IT) counterparts. This digital transformation of the factory floor has...
New Android & Google Device Vulnerability Reward Program
Google’s Device Vulnerability Reward Program helps the company identify security flaws in its operating system and devices.To promote additional security research in areas of...