Cybercriminals Increasingly Using EvilProxy Phishing Kit to Target Executives
Threat actors are increasingly using a phishing-as-a-service (PhaaS) toolkit dubbed EvilProxy to pull off account takeover attacks aimed at high-ranking…
Threat actors are increasingly using a phishing-as-a-service (PhaaS) toolkit dubbed EvilProxy to pull off account takeover attacks aimed at high-ranking…
Attackers continue to target Microsoft identities to gain access to connected Microsoft applications and federated SaaS applications. Additionally, attackers continue…
A widely used Chinese language input app for Windows and Android has been found vulnerable to serious security flaws that…
Tactical similarities have been unearthed between the double extortion ransomware group known as Rhysida and Vice Society, including in their…
Exposed Kubernetes (K8s) clusters are being exploited by malicious actors to deploy cryptocurrency miners and other backdoors. Cloud security firm…
Microsoft has patched a total of 74 flaws in its software as part of the company's Patch Tuesday updates for…
The U.K. Electoral Commission on Tuesday disclosed a "complex" cyber attack on its systems that went undetected for over a…
1. EXECUTIVE SUMMARY CVSS v3 7.8 ATTENTION: Low attack complexity / public exploits available Vendor: Siemens Equipment: SICAM TOOLBOX II…
1. EXECUTIVE SUMMARY CVSS v3 7.4 ATTENTION: Exploitable remotely Vendor: Siemens Equipment: SIMATIC, SIPLUS Vulnerability: Improper Input Validation 2. RISK…
1. EXECUTIVE SUMMARY CVSS v3 7.8 ATTENTION: Exploitable remotely/low attack complexity Vendor: Siemens Equipment: Software Center Vulnerabilities: Uncontrolled Search Path…