Failure of Silicon Valley Bank May Lead to Phishing BEC-like Scams
The failure of Silicon Valley Bank (SVB) and Signature Bank this weekend left many of the bank's customers with questions as to how to communicate with the bank, or how…
The failure of Silicon Valley Bank (SVB) and Signature Bank this weekend left many of the bank's customers with questions as to how to communicate with the bank, or how…
The US Cybersecurity and Infrastructure Security Agency (CISA) has added two vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog: a remote code execution flaw in Plex Media Server and a…
Cloud cybersecurity experts from Wiz have detected a website hijacking campaign that uses stolen FTP (file transfer protocol) credentials to redirect users to websites of the attackers’ choosing. The campaign…
A vulnerability has been identified in Citrix Workspace app for Linux that, if exploited, may result in a malicious local user being able to gain access to the Citrix Virtual…
A external control of file name or path in Fortinet FortiNAC versions 9.4.0, 9.2.0 through 9.2.5, 9.1.0 through 9.1.7, 8.8.0 through 8.8.11, 8.7.0 through 8.7.6, 8.6.0 through 8.6.5, 8.5.0 through…
Docker is one of the most common container technologies in enterprise environments. Therefore, the CIS is providing benchmark tests for configuration compliance in Docker environments which are, intended for system…
A new malware campaign has been found targeting Chinese-speaking people in East and Southeast Asia by purchasing misleading ads to appear in Google Search, ultimately leading to the download of…
Atlassian confirmed a data breach that impacted its employee records, building floor plans, and other sensitive data. A hacker group, named SiegedSec, posted on Telegram, claiming the attack. More information…
F5 has published a security advisory warning of a high-severity flaw in iControl SOAP. The format string vulnerability could be exploited to crash the iControl SOAP CGI process or execute…
Cisco has released updates to address a command injection vulnerability in its IOx application hosting environment. The high-severity flaw exists “due to incomplete sanitization of parameters that are passed in…