February 8, 2024 | Cybernews
RedHat has released version 15.8 of the Linux shim bootloader to address a critical vulnerability that allows for remote code execution and a Secure Boot bypass, affecting all Linux boot loaders signed in the past decade and posing a significant threat to a wide range of devices and systems, including IoT and OT systems.
February 8, 2024 | Cybernews
JetBrains has released an urgent patch to address a critical vulnerability in their TeamCity On-Premises software that allows remote attackers to bypass authentication checks and gain administrative control over the server.
February 8, 2024 | Cybernews
China-backed hackers known as Volt Typhoon have been compromising critical infrastructure providers in the US and other countries for at least five years, targeting sectors such as energy, water, telecommunications, and transportation systems.
February 8, 2024 | Cybernews
Chinese state-backed hackers exploit a zero-day vulnerability in FortiOS to breach the Dutch Ministry of Defense, targeting a segmented network and using a specialized malware called Coathanger.
February 8, 2024 | Cybernews
The cyber threat landscape surrounding major sporting events like the Super Bowl poses risks to sensitive data and systems, with threat actors engaging in activities such as social engineering, ransom attacks, disinformation campaigns, and data exfiltration.
February 8, 2024 | Cybernews
The Pall Mall Process, an international initiative led by the UK and France, aims to address the proliferation and misuse of commercial cyber intrusion tools, particularly spyware, through joint-action commitments by tech leaders, legal experts, and human rights defenders.