China’s internet regulator, the Ministry of Industry and Information Technology (MIIT), has temporarily suspended the partnership with Alibaba Cloud for… Read More
The Belgian defense ministry announced that it was hit by a cyberattack where the threat actors have exploited the Log4Shell… Read More
Apache has released another update shortly after the second Log4j update addressing a previously “incomplete… Apache Releases Third Major Log4j… Read More
Even more troublingly, researchers at Praetorian warned of a third separate security weakness in Log4j version 2.15.0 that can "allow… Read More
Cybereason released a mitigation tool named Logout4shell. It is freely available on GitHub and Cybereason said it "is a relatively… Read More
Exploit code has been released for a serious code-execution vulnerability in Log4j, which is used by large enterprises and also… Read More
Researchers at Spectral discovered a security flaw in Kafdrop, a popular open-source UI and management interface for Apache Kafka clusters,… Read More
The two weaknesses — collectively called Printing Shellz — were discovered and reported to HP by F-Secure Labs researchers Timo… Read More
Over 4,000 online retailers have been warned that their websites had been hacked by cybercriminals trying to steal payment information… Read More
A new Iranian threat actor has been found exploiting a patched critical flaw in the Microsoft Windows MSHTML platform to… Read More
A major security flaw in Starter Templates Plugin could allow underprivileged authenticated users to import… Starter Templates Plugin Flaw Affected… Read More
The security issue meant internet users with Sky routers were vulnerable to hacks and online attacks for well over a… Read More
The Federal Bureau of Investigation (FBI) warned of an advanced persistent threat (APT) compromising FatPipe router clustering and load balancer… Read More
Netgear addressed a pre-authentication buffer overflow issue in its SOHO devices that can be exploited by an attacker on the… Read More
Google observed that hackers were using a watering hole attack. In this attack, the websites targeted are typically selected by… Read More
Google's Threat Analysis Group (TAG) has revealed that hackers targeting visitors to websites in Hong Kong were using a previously… Read More