The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a security alert about Karakurt, a cybercriminal extortion group that extracts data from affected organizations and threatens to sell or
A proof of concept (PoC) code for CVE-2022-22972, a critical vulnerability in some VMware products such as Workspace ONE Access, Identity Manager, and vRealize Automation, has been publicly disclosed. This
Lincoln College, an arts school based in Illinois, announced its definitive shutdown after severe financial damage caused by a ransomware attack, coupled with the devastating consequences of the COVID-19 pandemic.
A report by F5 Networks points to the detection of a critical vulnerability that would allow threat actors with access to an exposed network to execute arbitrary commands, deploy file
Cybersecurity specialists report the detection of two critical vulnerabilities in Power Line Communications (PLC) J2497, a two-way serial communications link used in trailers and other transport vehicles. According to the
Cybersecurity specialists from Juniper Networks announced the release of multiple security patches to address more than 30 flaws in their products, including critical bugs in Contrail Networking and Junos OS.
Claroty cybersecurity specialists report the identification of two serious vulnerabilities whose exploitation would allow threat actors to deploy severe attacks targeting programmable logic controllers (PLC) developed by Rockwell Automation. The
Cybersecurity specialists report the detection of a dangerous vulnerability in Philips e-Alert, a monitoring platform for magnetic resonance imaging equipment used in hospitals around the world. According to the report,
Cybersecurity specialists report the detection of at least 4 vulnerabilities in CX-Position, a position control software developed by the technology firm Omron. According to the report, successful exploitation of these
In its most recent statement, the Cybersecurity and Infrastructure Security Agency (CISA) added 15 new vulnerabilities to its Catalog of Known Exploited Vulnerabilities, a list of known security flaws that