UDP Technology IP Camera firmware vulnerabilities allow for attacker to achieve root

Researchers found 11 vulnerabilities in IP camera firmware, but the vendor refused to work with them. As a result users are left wondering whether their camera’s can be taken over remotely.

Read more

StopRansomware.gov brings together information on stopping and surviving ransomware attacks

StopRansomware.gov is designed to be a one-stop hub for ransomware resources.

Read more

UPDATED: Patch now! Emergency fix for PrintNightmare released by Microsoft

Microsoft has issued out-of-band updates for the remote code execution PrintNightmare vulnerability.

Read more

JBS says it is recovering quickly from a ransomware attack

JBS, one of the world’s largest meat and poultry processors, suffered a ransomware attack that shut down some of their plants.

Read more

Colonial Pipeline attack expected to trigger imminent hardening of cybersecurity rules for federal agencies

Colonial Pipeline’s ransomware attack caused the White House to possibly refine a planned Executive Order on cybersecurity.

Read more

Task Force delivers strategic plan to address global ransomware problem

The Ransomware Task Force (RTF) has proposed a sorely needed response to the rising ransomware threat.

Read more

IoT riddled with BadAlloc vulnerabilities

A set of memory allocation vulnerabilities, dubbed BadAlloc, has been found in a massive number of IoT and OT devices.

Read more

SUPERNOVA malware discovered on SolarWinds Orion server

During an incident response investigation CISA found SUPERNOVA malware hidden on a server running SolarWinds Orion.

Read more

Patch now! NSA, CISA, and FBI warn of Russian intelligence exploiting 5 vulnerabilities

US intelligence and law enforcement agencies have issued a joint advisory listing 5 specific vulnerabilities being used by the SVR against the US and its allies.

Read more

Microsoft Exchange attacks cause panic as criminals go shell collecting

The ProxyLogon vulnerability in Microsoft Exchange has moved from an Advanced Persistent Threat to cybercrime’s new toy in record time.

Read more

Select your language