The bug has a severe rating of 9.8, public exploits are released.
Author: Threatpost
GitHub shared the timeline of breaches in April 2022, this timeline encompasses the information related to when a threat actor gained access and stole private repositories belonging to dozens of organizations.
The Botnet appears to use a new delivery method for compromising Windows systems after Microsoft disables VBA macros by default.
No government and customer data was accessed.
Last year, Google Project Zero tracked a record 58 exploited-in-the-wild zero-day security holes.
Citizen Lab uncovers multi-year campaign targeting autonomous region of Spain, called Catalonia.
In this time of unprecedented cyberwar, organizations must protect the personal digital lives of their executives in order to reduce the company’s risk of direct or collateral damage.
The APT28 (Advanced persistence threat) is operating since 2009, this group has worked under different names such as Sofacy, Sednit, Strontium Storm, Fancy Bear, Iron Twilight, and Pawn.