Browsing: attack
Palo Alto Networks firewall bug under attack brings new havoc to thousands of companies
Palo Alto Networks urged companies this week to patch a newly discovered zero-day vulnerability in one of its widely used security products after malicious hackers began…
US says Russian hackers stole federal government emails during Microsoft cyber attack
The US Cybersecurity and Infrastructure Security Agency (CISA) has confirmed that Russian-backed hackers stole emails from various US federal agencies as a result of an ongoing…
On Friday, Microsoft said Russian government hackers continue to break into its systems using information obtained during a hack last year. This time, Russian hackers called…
LoanDepot Says About 17 Million Customers Had Personal Data and Social Security Numbers Stolen During Cyber Attack
Nearly 17 million LoanDepot customers had sensitive personal information stolen, including Social Security numbers, in a ransomware attack in January, the company confirmed. The giant loan…
An ongoing cyberattack on US health tech giant Change Healthcare that caused outages and outages at hospitals and pharmacies across the US last week was caused…
Researchers say exploitable security flaws in ConnectWise remote access software are now under massive attack
Security researchers say a pair of easily exploitable flaws in a popular remote access tool used by more than a million companies worldwide are now being…
Researchers warn high-risk ConnectWise flaw under attack ’embarrassingly easy’ to exploit
“I can’t sugar coat it – this shit is bad,” said the Huntress CEO The security experts are warning that a high-risk vulnerability in a widely…
US healthcare technology giant Change Healthcare has confirmed a cyber attack on its systems. In a brief statement, the company said it was “experiencing a network…
A spam attack that affected open source X competitor Mastodon, Misskey and other apps highlights how the decentralized social web, also known as the fediverse, is…
Ionix (formerly Cyberpion) helps enterprises reduce their attack surface by giving them a better view of their overall security posture and software supply chain across on-premise,…