Apple fixes three new zero-days exploited to hack iPhones, Macs
The security bugs were all found in the multi-platform WebKit browser engine and are tracked as CVE-2023-32409, CVE-2023-28204, and CVE-2023-32373
Read More...The security bugs were all found in the multi-platform WebKit browser engine and are tracked as CVE-2023-32409, CVE-2023-28204, and CVE-2023-32373
Read More...The gang has been observed gaining access to victim networks via remote desktop protocol (RDP) credentials that were likely acquired from initial access brokers or via phishing attacks
Read More...An attacker could exploit the bug via crafted arguments to existing commands, allowing them to execute unauthorized commands
Read More...Ransomware operations have followed this trend and created Linux encryptors dedicated to targeting ESXi servers to encrypt all data used by the enterprise properly
Read More...Successful exploitation enables unauthenticated attackers to launch cross-site scripting attacks remotely but requires user interaction
Read More...With Cisco and VMware appliances turning out to be lucrative targets for threat actors, it's recommended that users move quickly to apply the updates to mitigate potential threats
Read More...The MS-SQL servers are being breached via brute-force or dictionary attacks that take advantage of easy-to-guess account credentials
Read More...Details about the two vulnerabilities have been withheld in light of active exploitation and to prevent more threat actors from abusing them
Read More...The information disclosure flaw could allow an attacker to access sensitive information transmitted between the vulnerable HP printers and other devices on the network
Read More...After the initial compromise, the threat actor used the Advanced IP Scanner and ADRecon utilities to gather information about the victim's environment
Read More...