Watch Out! Hackers Begin Exploiting Recent Zyxel Firewalls RCE Vulnerability
Image source: z3r00t
The U.S. Cybersecurity and Infrastructure Security Agency on Monday added two security flaws, including the recently disclosed remote code execution bug affecting Zyxel firewalls, to its Known Exploited Vulnerabilities Catalog, citing evidence...
Researchers Warn of "Eternity Project" Malware Service Being Sold via Telegram
An unidentified threat actor has been linked to an actively in-development malware toolkit called the "Eternity Project" that lets professional and amateur cybercriminals buy stealers, clippers, worms, miners, ransomware, and a...
RF Technologies Releases Safe Place Staff Protection for Healthcare Settings
RFT is expanding the Safe Place hospital market security system to include staff protection....
Researchers Find Potential Way to Run Malware on iPhone Even When it's OFF
A first-of-its-kind security analysis of iOS Find My function has identified a novel attack surface that makes it possible to tamper with the firmware and load malware onto a Bluetooth chip...
Fake Clickjacking Bug Bounty Reports: The Key Facts
Are you aware of fake clickjacking bug bounty reports? If not, you should be. This article will get you up to speed and help you to stay alert.
What are clickjacking bug...
The downside of ‘debugging’ ransomware
The decision to release a ransomware decryptor involves a delicate balancing act between helping victims recover their data and alerting criminals to errors in their code The post The downside of ‘debugging’ ransomware appeared first on WeLiveSecurity
Europe Agrees to Adopt New NIS2 Directive Aimed at Hardening Cybersecurity
The European Parliament announced a "provisional agreement" aimed at improving cybersecurity and resilience of both public and private sector entities in the European Union.
The revised directive, called "NIS2" (short for network...
Ukrainian Hacker Jailed for 4-Years in U.S. for Selling Access to Hacked Servers
A 28-year-old Ukrainian national has been sentenced to four years in prison for siphoning thousands of server login credentials and selling them on the dark web for monetary gain as part...
How to Turn a Coke Can Into an Eavesdropping Device
Cyber-researchers are testing the bounds of optical attacks with a technique that allows attackers to recover voice audio from meetings if there are shiny, lightweight objects nearby....
Get Lifetime Access to 2022 Cybersecurity Certification Prep Courses @ 95% Off
Ever thought about working full-time in cybersecurity? With millions of unfilled jobs around, now is a great time to get into the industry. Of course, there are many different roles in this...
SonicWall Releases Patches for New Flaws Affecting SSLVPN SMA1000 Devices
SonicWall has published an advisory warning of a trio of security flaws in its Secure Mobile Access (SMA) 1000 appliances, including a high-severity authentication bypass vulnerability.
The weaknesses in question impact SMA 6200, 6210,...
US Agrees to International Electronic Cybercrime Evidence Swap
The Budapest Convention is a multinational coalition that agrees to share electronic evidence across international jurisdictions to track down cybercriminals....