Secret Blizzard Targets Ukrainian Military with Custom Malware
Microsoft detailed how Russian espionage group Secret Blizzard is leveraging infrastructure of other threat actors to target the Ukrainian military with custom malware Read More
Sophisticated Scam Targets UAE Residents with Fake Police Fines
Fraudsters in UAE posed as Dubai Police, targeting citizens with fake fines via calls, emails and SMS Read More
Multiple Vulnerabilities in Ivanti Cloud Services Application (CSA) Could Allow for Remote Code Execution
Multiple vulnerabilities have been discovered in Ivanti Cloud Services Application (CSA), the most severe of which could allow for remote code execution. Ivanti Endpoint Manager...
Cyber Incident Disrupting Krispy Kreme Online Orders
Krispy Kreme said the incident is likely to materially affect operations and short-term financial performance Read More
South Korea Takes Down Fraudulent Online Trading Network Used to Extort $6.3M
The Korean Financial Security Institute (K-FSI) disrupted a fraudulent network that made $6.3m by stealing money from fake personal trading platforms Read More
bpftool-7.5.0-1.fc41 kernel-6.12.4-200.fc41 kernel-headers-6.12.4-200.fc41
FEDORA-2024-9fb3492511 Packages in this update: bpftool-7.5.0-1.fc41 kernel-6.12.4-200.fc41 kernel-headers-6.12.4-200.fc41 Update description: The 6.12.4 stable kernel rebase contains new features, additional hardware support and a number of...
bpftool-7.5.0-1.fc40 kernel-6.12.4-100.fc40 kernel-headers-6.12.4-100.fc40
FEDORA-2024-811cffc4ef Packages in this update: bpftool-7.5.0-1.fc40 kernel-6.12.4-100.fc40 kernel-headers-6.12.4-100.fc40 Update description: The 6.12.4 stable kernel rebase contains new features, additional hardware support and a number of...
Microsoft Azure MFA Flaw Allowed Easy Access Bypass
Microsoft MFA flaw exposed that allowed attackers to bypass security within an hour, putting 400m Office 365 accounts at risk Read More
USN-7150-1: Tornado vulnerabilities
It was discovered that Tornado incorrectly handled a certain redirect. A remote attacker could possibly use this issue to redirect a user to an arbitrary...
Jailbreaking LLM-Controlled Robots
Surprising no one, it’s easy to trick an LLM-controlled robot into ignoring its safety instructions. Read More