Latest News
Stay up to date with the latest posts and updates
Alerts
-
Attacker Breach ‘Dozens’ of GitHub Repos Using Stolen OAuth Tokens
GitHub shared the timeline of breaches in April 2022, this timeline encompasses the information related to when a threat actor gained access and stole private repositories belonging to…
4 min read
-
Emotet is Back From ‘Spring Break’ With New Nasty Tricks
The Botnet appears to use a new delivery method for compromising Windows systems after Microsoft disables VBA macros by default.
4 min read
-
2021 Top Routinely Exploited Vulnerabilities
Original release date: April 27, 2022 CISA, the National Security Agency (NSA), the Federal Bureau of Investigation (FBI), the Australian Cyber Security Centre (ACSC), the Canadian Centre for…
4 min read
-
AA22-117A: 2021 Top Routinely Exploited Vulnerabilities
Original release date: April 27, 2022 Summary This joint Cybersecurity Advisory (CSA) was coauthored by cybersecurity authorities of the United States, Australia, Canada, New Zealand, and the United…
4 min read
-
Millions of Java Apps Remain Vulnerable to Log4Shell
Four months after the critical flaw was discovered, attackers have a massive attack surface from which they can exploit the flaw and take over systems, researchers found.
4 min read
-
Vulnerability Summary for the Week of April 18, 2022
Original release date: April 25, 2022 | Last revised: April 26, 2022 High Vulnerabilities Primary Vendor — Product Description Published CVSS Score Source & Patch Info microsoft…
4 min read