RCE vulnerabilities found in industrial VPN solutions
The exploitation of vulnerabilities allows to overwrite data, execute malicious code or commands and cause a DoS condition.
The exploitation of vulnerabilities allows to overwrite data, execute malicious code or commands and cause a DoS condition.
Most victims of the malware threat are located in Western Europe and North America.
One of the vulnerabilities has already been exploited in the wild.
Weekly vulnerability digest.
Because the affected SDK was hosted on a misconfigured S3 bucket, the attackers were able to upload modified version of the taskrouter.min.js file.
Some Garmin emloyees speculate the involvement of a new strain of the WastedLocker ransomware.
A recent Shodan search has shown that 987 ElasticSearch and 70 MongoDB instances have been affected by Meow attack.
The Prometei cryptomining botnet leverages Windows SMB protocol for propagation.
Radchenko and Ieremenko gained access to the Security and Exchange Commission’s EDGAR system and stole thousands of confidential files.
The MATA framework is designed to target Windows, Linux and macOS operating systems.
Showing elements 3531 - 3540