Libraesva rolled out an emergency update for its Email Security Gateway solution to fix a vulnerability exploited by threat actors believed to be state sponsored. […] Go to Source Author: Bill Toulas
Category Archives: Security
WhatsApp has started rolling out a new translation feature that enables Android and iPhone users to translate messages in chats, groups, and channel updates. […] Go to Source Author: Sergiu Gatlan
Cloudflare has mitigated a distributed denial-of-service (DDoS) attack that peaked at a record-breaking 22.2 terabits per second (Tbps) and 10.6 billion packets per second (Bpps). […] Go to Source Author: Bill Toulas
CISA has revealed that attackers breached the network of an unnamed U.S. federal civilian executive branch (FCEB) agency last year after compromising an unpatched GeoServer instance. […] Go to Source Author: Sergiu Gatlan
Law enforcement authorities in Europe have arrested five suspects linked to a cryptocurrency investment fraud ring that stole over €100 million ($118 million) from more than 100 victims. […] Go to Source Author: Sergiu Gatlan
Identity Governance doesn’t have to be complex or costly. tenfold’s free Community Edition helps orgs (up to 150 users) streamline onboarding, access reviews & M365 permissions — all with a no-code IGA platform. […] Go to Source Author: Sponsored by tenfold Software
SolarWinds has released a hotfix for a critical a critical vulnerability in Web Help Desk that allows remote code execution (RCE) without authentication. […] Go to Source Author: Bill Toulas
SonicWall has released a firmware update that can help customers remove rootkit malware deployed in attacks targeting SMA 100 series devices. […] Go to Source Author: Sergiu Gatlan
GitHub is introducing a set of defenses against supply-chain attacks on the platform that led to multiple large-scale incidents recently. […] Go to Source Author: Bill Toulas
Newly discovered npm package ‘fezbox’ employs QR codes to hide a second-stage payload to steal cookies from a user’s web browser. The package, masquerading as a utility library, leverages this innovative steganographic technique to harvest sensitive data, such as user credentials, from a compromised machine. […] Go to Source Author: Ax Sharma
