"Network" Related Articles

MITRE Corporation Breached by Nation-State Hackers Exploiting Ivanti Flaws

MITRE Corporation Breached by Nation-State Hackers Exploiting Ivanti Flaws

The MITRE Corporation reported a cyber attack that began in January 2024, involving a nation-state actor exploiting two zero-day vulnerabilities...

Read more →

Palo Alto firewalls: Public exploits, rising attacks, ineffective mitigation

Palo Alto firewalls: Public exploits, rising attacks, ineffective mitigation

While it initially seemed that protecting Palo Alto Network firewalls from attacks leveraging CVE-2024-3400 would be possible by disabling the...

Read more →

NSA shares zero-trust guidance to limit adversaries on the network

NSA shares zero-trust guidance to limit adversaries on the network

The National Security Agency is sharing new guidance to help organizations limit an adversary's movement on the internal network by...

Read more →

Zoom patches critical privilege elevation flaw in Windows apps

Zoom patches critical privilege elevation flaw in Windows apps

The Zoom desktop and VDI clients and the Meeting SDK for Windows are vulnerable to an improper input validation flaw...

Read more →

SQLi vulnerability in Cacti could lead to RCE (CVE-2023-51448)

SQLi vulnerability in Cacti could lead to RCE (CVE-2023-51448)

A blind SQL injection vulnerability in Cacti, a widely-used network monitoring, performance and fault management framework, could lead to information...

Read more →

Nissan Australia cyberattack claimed by Akira ransomware gang

Nissan Australia cyberattack claimed by Akira ransomware gang

Today, the Akira ransomware gang claimed that it breached the network of Nissan Australia, the Australian division of Japanese car...

Read more →

Canada bans WeChat and Kaspersky products on govt devices

Canada bans WeChat and Kaspersky products on govt devices

Canada has banned the use of Kaspersky security products and Tencent's WeChat app on mobile devices used by government employees,...

Read more →

Kwik Trip finally confirms cyberattack was behind ongoing outage

Kwik Trip finally confirms cyberattack was behind ongoing outage

Two weeks into an ongoing IT outage, Kwik Trip finally confirmed that it's investigating a cyberattack impacting the convenience store...

Read more →

Top Exploited Vulnerabilities

Top Network Security Known Vulnerabilities

Network security is a critical aspect of cybersecurity that involves protecting computer networks from unauthorized access, misuse, and attacks. With...

Read more →

Lyca Mobile investigates customer data leak after cyberattack

Lyca Mobile investigates customer data leak after cyberattack

Lyca Mobile has released a statement about an unexpected disruption on its network caused by a cyberattack that may have...

Read more →

Forever 21 data breach: hackers accessed info of 500,000

Forever 21 data breach: hackers accessed info of 500,000

Forever 21 clothing and accessories retailer is sending data breach notifications to more than half a million individuals who had...

Read more →

Cybersecurity Incidents

How Does Ransomware Spread in a Network?

Ransomware is a type of malware that encrypts files on a victim’s computer, making them inaccessible until the victim pays...

Read more →

No more resources to show

BOOK A MEETING

Provide your contact details

This field is for validation purposes and should be left unchanged.

* Aucun fournisseur de courriel personnel permis (e.g: gmail.com, hotmail.com, etc.)

This site is registered on wpml.org as a development site. Switch to a production site key to remove this banner.