What Is the True Meaning of SASE?
In 2021, Versa Networks reported an active 34% of companies already utilizing SASE, with a potential 30% increase in about 12 months after. And vendors also started to include additionalRead More →
In 2021, Versa Networks reported an active 34% of companies already utilizing SASE, with a potential 30% increase in about 12 months after. And vendors also started to include additionalRead More →
Claroty cybersecurity specialists report the identification of two serious vulnerabilities whose exploitation would allow threat actors to deploy severe attacks targeting programmable logic controllers (PLC) developed by Rockwell Automation. TheRead More →
The PCI Security Standards Council (SSC), the organization dedicated to overseeing the Payment Card Industry Data Security Standard (PCI DSS), announced the release of PCI DSS v4.0, which will replaceRead More →
Cybersecurity specialists report the detection of a dangerous vulnerability in Philips e-Alert, a monitoring platform for magnetic resonance imaging equipment used in hospitals around the world. According to the report,Read More →
Rapid7 security teams announced the fix of a critical SQL injection vulnerability in Nexpose, a popular local vulnerabilities management software. The flaw was tracked as CVE-2022-0757 and received a scoreRead More →
After multiple reports surfaced over the past week, Spring confirmed the remote code execution (RCE) vulnerability in the Spring Framework. The vulnerability has been tracked as CVE-2022-22965 and it isRead More →
Cybersecurity specialists reported a new critical zero-day vulnerability in the Spring Core Java framework. Successful exploitation would allow remote code execution (RCE) in affected applications. Spring is a framework thatRead More →
Cybersecurity specialists report the detection of at least 4 vulnerabilities in CX-Position, a position control software developed by the technology firm Omron. According to the report, successful exploitation of theseRead More →
Cybersecurity specialists report the discovery of a variant of cyberattack against Combined Charging Systems (CCS), one of the most used technological implementations in current electric cars. According to the report,Read More →
Information security reports indicate that Ronin, the blockchain behind the popular NFT game ‘Axie Infinity’, was the target of a cyberattack that led to the theft of some $625 millionRead More →
This morning, the hacktivist group Anonymous claimed responsibility for an alleged cyberattack against two large Russian companies, stealing a large amount of data and making it available for download onRead More →
Cisco Talos researchers reported detecting a new hacking campaign by the group identified as Transparent Tribe and targeting government organizations in India. Active at least since mid-2021, this campaign isRead More →
A security report indicates that the developer of the node-ipc JavaScript library, used by the vue.js framework, intentionally introduced a critical vulnerability that could prove disastrous for some users. BrandonRead More →
Ukrainian authorities announced the dismantling of five huge bot farms from which more than 100,000 social media accounts dedicated to the spread of fake news were controlled as part ofRead More →
As part of cyberattacks in protest against the military invasion of Ukraine, the hacktivist group Anonymous claims to have compromised the systems of the Central Bank of Russia, resulting inRead More →
Sophos security teams announced the fixing of a critical remote code execution (RCE) vulnerability in the Sophos Firewall family of products for home and enterprise environments. Sophos Firewall includes TLSRead More →
The New York Department of Education has confirmed that the personal information of up to 820,000 former and current students in the city’s public schools was exposed due to theRead More →
In an unusual incident, British authorities have accused a 16-year-old boy of being one of the leaders of the dangerous hacking group Lapsus$. The young man was also identified byRead More →
Cybersecurity specialists have found a variant of “replay attack” that would allow threat actors to unlock and even start some models of keyless cars manufactured by Honda and Acura fromRead More →
Two vulnerabilities have been confirmed to be detected in Epic Games Launcher, the online library and account management tool for PC gaming. According to the report, the successful exploitation ofRead More →