Articles

SolarWinds has fixed a vulnerability in Serv-U that was used in attacks on Log4j

Microsoft  discovered a vulnerability in Serv-U that hackers exploited to carry out Log4j attacks on internal devices in the network of victim companies. The bug was discovered...

Vulnerability in macOS Leads to Data Leakage

Microsoft experts said that attackers could use a macOS vulnerability to bypass Transparency, Consent, and Control (TCC) technology and gain access to protected user...

Microsoft Defender Log4j Problem Scanner finds non-existent bugs

The media reports that Microsoft Defender for Endpoint is showing false warnings about some kind of "sensor tampering" associated with the recently deployed Microsoft...

Abcbot botnet attacks Chinese cloud providers

The Arcbot botnet attacks the infrastructure of Chinese cloud hosting providers, researchers at Cado Security warned . Presumably, the main purpose of malware is cryptocurrency mining. Abcbot attacks the...

Log4j 0 Day: Experts are already fixing attacks on the Log4Shell vulnerability

Cybercriminals and cybersecurity researchers are already scanning the network for products vulnerable to a dangerous bug in the Log4j library, which has been named Log4Shell . The...

Dark Mirai botnet exploits RCE vulnerability in TP-Link routers

According to Fortinet experts, the Dark Mirai (aka Manga or Dark.IoT) botnet operators are actively abusing a recently discovered vulnerability in TP-Link routers. The attacks...

0-day in Log4j library poses a threat to many applications and servers

The Apache Software Foundation has released an emergency security update that fixes a 0-day vulnerability ( CVE-2021-44228 ) in the popular Log4j logging library, which is...

226 vulnerabilities found in popular router models

Researchers at IoT Inspector, in collaboration with Chip, have verified the security of many popular routers from Asus, AVM, D-Link, Netgear, Edimax, TP-Link, Synology and Linksys...

Latest news

Chinese hack group GhostEmperor uses new rootkit against Windows 10

At the SAS 2021 conference, Kaspersky Lab analysts spoke about the tools of the new Chinese cyber-espionage group GhostEmperor, which has...

Vulnerability in macOS Leads to Data Leakage

Microsoft experts said that attackers could use a macOS vulnerability to bypass Transparency, Consent, and Control (TCC) technology and...

Microsoft Defender Log4j Problem Scanner finds non-existent bugs

The media reports that Microsoft Defender for Endpoint is showing false warnings about some kind of "sensor tampering" associated...

Must read

28 dangerous extensions detected for Google Chrome and Microsoft Edge

Avast experts have discovered malware hidden in at least 28 third-party...

Critical Infrastructure Warning! Millions of PLCs, switches, IoT devices are under threat

Eleven vulnerabilities, combined under the name Urgent / 11,...

You might also likeRELATED
Recommended to you

33 vulnerabilities threaten millions of Critical Infrastructure

Cybersecurity researchers have found 33 vulnerabilities in four open...

SolarWinds has fixed a vulnerability in Serv-U that was used in attacks on Log4j

Microsoft  discovered a vulnerability in Serv-U that hackers exploited to carry...

Not the WordPress Newsletter you’ll want to receive

Wordpress is by far the most popular CMS out...