Cyber Security

Microsoft Defender Log4j Problem Scanner finds non-existent bugs

The media reports that Microsoft Defender for Endpoint is showing false warnings about some kind of "sensor tampering" associated with the recently deployed Microsoft...

Abcbot botnet attacks Chinese cloud providers

The Arcbot botnet attacks the infrastructure of Chinese cloud hosting providers, researchers at Cado Security warned . Presumably, the main purpose of malware is cryptocurrency mining. Abcbot attacks the...

Log4j 0 Day: Experts are already fixing attacks on the Log4Shell vulnerability

Cybercriminals and cybersecurity researchers are already scanning the network for products vulnerable to a dangerous bug in the Log4j library, which has been named Log4Shell . The...

Dark Mirai botnet exploits RCE vulnerability in TP-Link routers

According to Fortinet experts, the Dark Mirai (aka Manga or Dark.IoT) botnet operators are actively abusing a recently discovered vulnerability in TP-Link routers. The attacks...

0-day in Log4j library poses a threat to many applications and servers

The Apache Software Foundation has released an emergency security update that fixes a 0-day vulnerability ( CVE-2021-44228 ) in the popular Log4j logging library, which is...

226 vulnerabilities found in popular router models

Researchers at IoT Inspector, in collaboration with Chip, have verified the security of many popular routers from Asus, AVM, D-Link, Netgear, Edimax, TP-Link, Synology and Linksys...

Fresh Apache Vulnerability May Lead to Remote Code Execution

Earlier this week, the Apache Software Foundation released a patch  to address the 0-day vulnerability CVE-2021-41773 in its HTTP web server. Already at the time of the...

Fresh bug in VMware vCenter is already under attack

An exploit for the recently fixed RCE vulnerability in VMware vCenter (CVE-2021-22005) has been published online. Experts warned that hackers had already adopted the exploit. The...

Latest news

Chinese hack group GhostEmperor uses new rootkit against Windows 10

At the SAS 2021 conference, Kaspersky Lab analysts spoke about the tools of the new Chinese cyber-espionage group GhostEmperor, which has...

Vulnerability in macOS Leads to Data Leakage

Microsoft experts said that attackers could use a macOS vulnerability to bypass Transparency, Consent, and Control (TCC) technology and...

Microsoft Defender Log4j Problem Scanner finds non-existent bugs

The media reports that Microsoft Defender for Endpoint is showing false warnings about some kind of "sensor tampering" associated...

Must read

28 dangerous extensions detected for Google Chrome and Microsoft Edge

Avast experts have discovered malware hidden in at least 28 third-party...

Critical Infrastructure Warning! Millions of PLCs, switches, IoT devices are under threat

Eleven vulnerabilities, combined under the name Urgent / 11,...

You might also likeRELATED
Recommended to you

New web skimmer found in Shopify, BigCommerce, Woocommerce and Zencart stores

Sansec experts have discovered a new multi-platform MageCart skimmer that can...

Kaseya now has a decryptor for REvil

Representatives of the Kaseya company, whose clients have recently...