Zyxel firewalls under attack by Mirai-like botnet
CVE-2023-28771, the critical command injection vulnerability affecting many Zyxel firewalls, is being actively exploited by a Mirai-like botnet, and has been added to CISA’s Known Exploited Vulnerabilities (KEV) catalog. About CVE-2023-28771 CV.....»»
iPhone users in 92 countries received a spyware attack alert
A bunch of folks all over the world got a mysterious notification about a "mercenary spyware attack" targeting iPhones. Almost half of the countries in the world got a strange notification from Apple on Wednesday.At noon Pacific time on Wednesd.....»»
Ivanti empowers IT and security teams with new solutions and enhancements
Ivanti released Ivanti Neurons for External Attack Surface management (EASM), which helps combat attack surface expansion with full visibility of external-facing assets and actionable intelligence on exposures. With the evolution of Everywhere Work c.....»»
Apple alerts some iPhone users that they were targets of ‘mercenary spyware attack’
Apple is alerting users to a new instance of an identified mercenary spyware attack on the iPhone. Possible victims have been sent an email from Apple describing how the attack could “remotely compromise the iPhone”. Victims are being notified in.....»»
Apple warning users about a mercenary spyware attack on iPhones
Users in 92 countries worldwide have had notifications from Apple warning that they may be victims of a severe and sophisticated iPhone hack.Apple has been warning users of a spyware attack on iPhonesIn November 2021, Apple announced that it would al.....»»
Apple warns of a "mercenary spyware attack" on iPhones
Users in 92 countries worldwide have had notifications from Apple warning that they may be victims of a severe and sophisticated iPhone hack.Apple has been warning users of a spyware attack on iPhonesIn November 2021, Apple announced that it would al.....»»
GSMA releases Mobile Threat Intelligence Framework
GSM Association’s Fraud and Security Group (FASG) has published the first version of a framework for describing, in a structured way, how adversaries attack and use mobile networks, based on the tactics, techniques and procedures (TTPs) that they u.....»»
GSMA releases Mobile Threat Intelligence Framework
GSM Association’s Fraud and Security Group (FASG) has published the first version of a framework for describing, in a structured way, how adversaries attack and use mobile networks, based on the tactics, techniques and procedures (TTPs) that they u.....»»
GSMA releases Mobile Threat Intelligence Framework
GSM Association’s Fraud and Security Group (FASG) has published the first version of a framework for describing, in a structured way, how adversaries attack and use mobile networks, based on the tactics, techniques and procedures (TTPs) that they u.....»»
GSMA releases Mobile Threat Intelligence Framework
GSM Association’s Fraud and Security Group (FASG) has published the first version of a framework for describing, in a structured way, how adversaries attack and use mobile networks, based on the tactics, techniques and procedures (TTPs) that they u.....»»
GSMA releases Mobile Threat Intelligence Framework
GSM Association’s Fraud and Security Group (FASG) has published the first version of a framework for describing, in a structured way, how adversaries attack and use mobile networks, based on the tactics, techniques and procedures (TTPs) that they u.....»»
Thousands of Social Security numbers stolen from government firm
Details of attack are beginning to emerge, as Greylock McKinnon Associates notifies affected individuals......»»
Cloudflare partners with Booz Allen Hamilton to guide organizations under attack
Cloudflare announced a collaboration with Booz Allen Hamilton to support enterprises under attack by providing expedited Under Attack as a Service (UAaaS) with 30-Day Rapid Response DDoS Mitigation, including continuous monitoring and protection. Und.....»»
New micromaterial releases nanoparticles that selectively destroy cancer cells
Researchers have developed micromaterials made up only of proteins, capable of delivering over an extended period of time nanoparticles that attack specific cancer cells and destroy them. The micromaterials mimic natural secretory granules found in t.....»»
Attack and defense in the microverse: How small RNA molecules regulate viral infections of bacteria
Viruses need hosts. Whether it's measles, the flu or coronavirus, viral pathogens cannot multiply or infect other organisms without the assistance of their hosts' cellular infrastructure. However, humans are not the only ones affected by viruses: ani.....»»
Missouri county declares state of emergency amid suspected ransomware attack
Outage occurs on same day as special election, but elections offices remain open. Enlarge / Downtown Kansas City, Missouri, which is part of Jackson County. (credit: Eric Rogers) Jackson County, Missouri, has declared a.....»»
Stream.Security unveils threat investigation and AI-powered remediation capabilities
Stream.Security announced new threat investigation and AI-powered remediation capabilities. The new real-time attack path detection and generative AI-powered remediation tools are part of the real-time exposure management features that the cloud secu.....»»
How much does cloud-based identity expand your attack surface?
We all know using a cloud-based identity provider (IdP) expands your attack surface, but just how big does that attack surface get? And can we even know for sure? As Michael Jordan once said, “Get the fundamentals down, and the level of everything.....»»
PyPI halted new users and projects while it fended off supply-chain attack
Automation is making attacks on open source code repositories harder to fight. Enlarge / Supply-chain attacks, like the latest PyPI discovery, insert malicious code into seemingly functional software packages used by developers......»»
Thousands of servers hacked in ongoing attack targeting Ray AI framework
Researchers say it's the first known in-the-wild attack targeting AI workloads. Enlarge (credit: Getty Images) Thousands of servers storing AI workloads and network credentials have been hacked in an ongoing attack campa.....»»
Apple users targeted by sophisticated phishing attack to reset their ID password
There are many known phishing attacks that target users of Apple devices to gain access to their Apple ID. However, a new “elaborate” attack uses a bug in the Apple ID password reset feature with “push bombing” or “MFA fatigue” techniques.....»»