Featured

Firefox Affected by Flaw Similar to Chrome Zero-Day Exploited in Russia

Firefox Affected by Flaw Similar to Chrome Zero-Day Exploited in Russia 2025-03-28 at 12:26 By Eduard Kovacs Firefox developers have determined that their browser is affected by a vulnerability similar to the recent Chrome sandbox escape zero-day. The post Firefox Affected by Flaw Similar to Chrome Zero-Day Exploited in Russia appeared first on SecurityWeek. This […]

React to this headline:

Loading spinner

Firefox Affected by Flaw Similar to Chrome Zero-Day Exploited in Russia Read More »

More Solar System Vulnerabilities Expose Power Grids to Hacking 

More Solar System Vulnerabilities Expose Power Grids to Hacking  2025-03-27 at 12:32 By Eduard Kovacs Forescout has found dozens of vulnerabilities in solar power systems from Sungrow, Growatt and SMA. The post More Solar System Vulnerabilities Expose Power Grids to Hacking  appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source

React to this headline:

Loading spinner

More Solar System Vulnerabilities Expose Power Grids to Hacking  Read More »

IngressNightmare Flaws Expose Many Kubernetes Clusters to Remote Hacking

IngressNightmare Flaws Expose Many Kubernetes Clusters to Remote Hacking 2025-03-25 at 12:17 By Eduard Kovacs Critical remote code execution vulnerabilities found by Wiz researchers in Ingress NGINX Controller for Kubernetes. The post IngressNightmare Flaws Expose Many Kubernetes Clusters to Remote Hacking appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source

React to this headline:

Loading spinner

IngressNightmare Flaws Expose Many Kubernetes Clusters to Remote Hacking Read More »

FCC Probes Whether Banned Chinese Telecom Providers Still Operating in US

FCC Probes Whether Banned Chinese Telecom Providers Still Operating in US 2025-03-24 at 14:31 By Eduard Kovacs The FCC is investigating whether Chinese firms such as Huawei, ZTE and China Telecom are still operating in the US. The post FCC Probes Whether Banned Chinese Telecom Providers Still Operating in US appeared first on SecurityWeek. This

React to this headline:

Loading spinner

FCC Probes Whether Banned Chinese Telecom Providers Still Operating in US Read More »

Impact, Root Cause of GitHub Actions Supply Chain Hack Revealed

Impact, Root Cause of GitHub Actions Supply Chain Hack Revealed 2025-03-21 at 12:17 By Eduard Kovacs More details have come to light on the recent supply chain attack targeting GitHub Actions, including its root cause. The post Impact, Root Cause of GitHub Actions Supply Chain Hack Revealed appeared first on SecurityWeek. This article is an

React to this headline:

Loading spinner

Impact, Root Cause of GitHub Actions Supply Chain Hack Revealed Read More »

Paragon Spyware Attacks Exploited WhatsApp Zero-Day 

Paragon Spyware Attacks Exploited WhatsApp Zero-Day  2025-03-20 at 12:03 By Eduard Kovacs Attacks involving Paragon’s Graphite spyware involved a WhatsApp zero-day that could be exploited without any user interaction. The post Paragon Spyware Attacks Exploited WhatsApp Zero-Day  appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to this headline:

React to this headline:

Loading spinner

Paragon Spyware Attacks Exploited WhatsApp Zero-Day  Read More »

What’s Behind Google’s $32 Billion Wiz Acquisition?

What’s Behind Google’s $32 Billion Wiz Acquisition? 2025-03-19 at 17:09 By Ryan Naraine News analysis: Google positions itself to compete with Microsoft for enterprise security dollars. How does this deal affect startup ecosystem? The post What’s Behind Google’s $32 Billion Wiz Acquisition? appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original

React to this headline:

Loading spinner

What’s Behind Google’s $32 Billion Wiz Acquisition? Read More »

Scareware Combined With Phishing in Attacks Targeting macOS Users

Scareware Combined With Phishing in Attacks Targeting macOS Users 2025-03-19 at 14:11 By Ionut Arghire A long-running campaign phishing for credentials through scareware recently switched to targeting macOS users. The post Scareware Combined With Phishing in Attacks Targeting macOS Users appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React

React to this headline:

Loading spinner

Scareware Combined With Phishing in Attacks Targeting macOS Users Read More »

Google to Acquire Cloud Security Giant Wiz for $32 Billion in Cash

Google to Acquire Cloud Security Giant Wiz for $32 Billion in Cash 2025-03-18 at 15:18 By Eduard Kovacs Google has confirmed reports that it’s buying cloud security giant Wiz and says it’s prepared to pay $32 billion in cash. The post Google to Acquire Cloud Security Giant Wiz for $32 Billion in Cash appeared first

React to this headline:

Loading spinner

Google to Acquire Cloud Security Giant Wiz for $32 Billion in Cash Read More »

ChatGPT Vulnerability Exploited Against US Government Organizations

ChatGPT Vulnerability Exploited Against US Government Organizations 2025-03-18 at 12:02 By Ionut Arghire A year-old vulnerability in ChatGPT is being exploited against financial entities and US government organizations. The post ChatGPT Vulnerability Exploited Against US Government Organizations appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to this headline:

React to this headline:

Loading spinner

ChatGPT Vulnerability Exploited Against US Government Organizations Read More »

Nvidia Riva Vulnerabilities Allow Unauthorized Use of AI Services

Nvidia Riva Vulnerabilities Allow Unauthorized Use of AI Services 2025-03-17 at 13:16 By Eduard Kovacs Vulnerabilities in Nvidia Riva could allow hackers to abuse speech and translation AI services that are typically expensive.  The post Nvidia Riva Vulnerabilities Allow Unauthorized Use of AI Services appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

Nvidia Riva Vulnerabilities Allow Unauthorized Use of AI Services Read More »

Popular GitHub Action Targeted in Supply Chain Attack

Popular GitHub Action Targeted in Supply Chain Attack 2025-03-17 at 12:04 By Eduard Kovacs The tj-actions/changed-files GitHub Action, which is used in 23,000 repositories, has been targeted in a supply chain attack. The post Popular GitHub Action Targeted in Supply Chain Attack appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original

React to this headline:

Loading spinner

Popular GitHub Action Targeted in Supply Chain Attack Read More »

Recent Fortinet Vulnerabilities Exploited in ‘SuperBlack’ Ransomware Attacks

Recent Fortinet Vulnerabilities Exploited in ‘SuperBlack’ Ransomware Attacks 2025-03-14 at 12:27 By Ionut Arghire The newly discovered SuperBlack ransomware has been exploiting two vulnerabilities in Fortinet firewalls. The post Recent Fortinet Vulnerabilities Exploited in ‘SuperBlack’ Ransomware Attacks appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to this headline:

React to this headline:

Loading spinner

Recent Fortinet Vulnerabilities Exploited in ‘SuperBlack’ Ransomware Attacks Read More »

Medusa Ransomware Made 300 Critical Infrastructure Victims

Medusa Ransomware Made 300 Critical Infrastructure Victims 2025-03-13 at 14:53 By Ionut Arghire CISA, FBI, and MS-ISAC warn of Medusa ransomware attacks targeting critical infrastructure organizations. The post Medusa Ransomware Made 300 Critical Infrastructure Victims appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to this headline:

React to this headline:

Loading spinner

Medusa Ransomware Made 300 Critical Infrastructure Victims Read More »

China’s Volt Typhoon Hackers Dwelled in US Electric Grid for 300 Days

China’s Volt Typhoon Hackers Dwelled in US Electric Grid for 300 Days 2025-03-12 at 15:03 By Eduard Kovacs Dragos case study reveals that Volt Typhoon hacked the US electric grid and stole information on OT systems. The post China’s Volt Typhoon Hackers Dwelled in US Electric Grid for 300 Days appeared first on SecurityWeek. This

React to this headline:

Loading spinner

China’s Volt Typhoon Hackers Dwelled in US Electric Grid for 300 Days Read More »

Hackers Take Credit for X Cyberattack

Hackers Take Credit for X Cyberattack 2025-03-11 at 13:38 By Eduard Kovacs Information is coming to light on the cyberattack that caused X outages, but it should be taken with a pinch of salt. The post Hackers Take Credit for X Cyberattack appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original

React to this headline:

Loading spinner

Hackers Take Credit for X Cyberattack Read More »

560,000 People Impacted Across Four Healthcare Data Breaches

560,000 People Impacted Across Four Healthcare Data Breaches 2025-03-10 at 13:03 By Eduard Kovacs Several healthcare organizations in different US states have disclosed data breaches affecting 100,000-200,000 individuals.  The post 560,000 People Impacted Across Four Healthcare Data Breaches appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to this

React to this headline:

Loading spinner

560,000 People Impacted Across Four Healthcare Data Breaches Read More »

Edimax Camera Zero-Day Disclosed by CISA Exploited by Botnets

Edimax Camera Zero-Day Disclosed by CISA Exploited by Botnets 2025-03-07 at 10:31 By Eduard Kovacs Multiple Mirai-based botnets are exploiting CVE-2025-1316, an Edimax IP camera vulnerability that allows remote command execution. The post Edimax Camera Zero-Day Disclosed by CISA Exploited by Botnets appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original

React to this headline:

Loading spinner

Edimax Camera Zero-Day Disclosed by CISA Exploited by Botnets Read More »

Exploited VMware ESXi Flaws Put Many at Risk of Ransomware, Other Attacks

Exploited VMware ESXi Flaws Put Many at Risk of Ransomware, Other Attacks 2025-03-06 at 12:03 By Eduard Kovacs Scans show that tens of thousands of VMware ESXi instances are affected by CVE-2025-22224 and other vulnerabilities disclosed recently as zero-days. The post Exploited VMware ESXi Flaws Put Many at Risk of Ransomware, Other Attacks appeared first

React to this headline:

Loading spinner

Exploited VMware ESXi Flaws Put Many at Risk of Ransomware, Other Attacks Read More »

Intel TDX Connect Bridges the CPU-GPU Security Gap

Intel TDX Connect Bridges the CPU-GPU Security Gap 2025-03-04 at 18:19 By Kevin Townsend AI is all about data – and keeping AI’s data confidential both within devices and between devices is problematic. Intel offers a solution. The post Intel TDX Connect Bridges the CPU-GPU Security Gap appeared first on SecurityWeek. This article is an

React to this headline:

Loading spinner

Intel TDX Connect Bridges the CPU-GPU Security Gap Read More »

Buy Me A Coffee
Thank you for visiting!