Cisco fixed three RCE-vulneravilities Ripple20
One of the vulnerabilities has already been exploited in the wild.
One of the vulnerabilities has already been exploited in the wild.
Weekly vulnerability digest.
Because the affected SDK was hosted on a misconfigured S3 bucket, the attackers were able to upload modified version of the taskrouter.min.js file.
Some Garmin emloyees speculate the involvement of a new strain of the WastedLocker ransomware.
A recent Shodan search has shown that 987 ElasticSearch and 70 MongoDB instances have been affected by Meow attack.
The Prometei cryptomining botnet leverages Windows SMB protocol for propagation.
Radchenko and Ieremenko gained access to the Security and Exchange Commission’s EDGAR system and stole thousands of confidential files.
The MATA framework is designed to target Windows, Linux and macOS operating systems.
Adobe fixed a total of 13 vulnerabilities across its Bridge, Prelude and Photoshop products.
The accused gained access to victims’ networks using primarily publicly known vulnerabilities in popular web server software and applications.
Showing elements 3531 - 3540