Experts released PoC exploit code for VMware Aria Operations for Logs flaw. Patch it now! Security VMware is aware of the availability of a proof-of-concept (PoC)… rooter October 24, 2023 3 min read 0
EPA Won’t Force Water Utilities to Audit Their Cybersecurity Security The industry pushed back: Despite the EPA’s willingness to provide… rooter October 24, 2023 1 min read 0
How did the Okta Support breach impact 1Password? Security 1Password detected suspicious activity on its Okta instance after the… rooter October 24, 2023 5 min read 0
PII Belonging to Indian Citizens, Including their Aadhaar IDs, Offered for Sale on the Dark Web Security Hundreds of millions of PII records belonging to Indian residents,… rooter October 24, 2023 4 min read 0
Spain police dismantled a cybercriminal group who stole the data of 4 million individuals Security The Spanish police have arrested 34 members of the cybercriminal… rooter October 24, 2023 2 min read 0
CISA adds second Cisco IOS XE flaw to its Known Exploited Vulnerabilities catalog Security US CISA added the vulnerability CVE-2023-20273 in Cisco IOS XE to its… rooter October 23, 2023 3 min read 0
Cisco warns of a second IOS XE zero-day used to infect devices worldwide Security Cisco found a second IOS XE zero-day vulnerability, tracked as… rooter October 23, 2023 5 min read 0
City of Philadelphia suffers a data breach Security The City of Philadelphia discloses a data breach that resulted… rooter October 23, 2023 2 min read 0
SolarWinds fixed three critical RCE flaws in its Access Rights Manager product Security Researchers discovered three critical remote code execution vulnerabilities in the SolarWinds… rooter October 23, 2023 2 min read 0
Child Exploitation and the Crypto Wars Security Susan Landau published an excellent essay on the current justification… rooter October 23, 2023 1 min read 0