Security News

Critical RCE bug in Microsoft Outlook now exploited in attacks
2025-02-06 18:17

CISA warned U.S. federal agencies on Thursday to secure their systems against ongoing attacks targeting a critical Microsoft Outlook remote code execution (RCE) vulnerability. [...]

DDoS attacks reportedly behind DayZ and Arma network outages
2025-02-06 16:09

An ongoing distributed denial of service (DDoS) attack targets Bohemia Interactive's infrastructure, preventing players of DayZ and Arma Reforger from playing the games online. [...]

CISA orders agencies to patch Linux kernel bug exploited in attacks
2025-02-05 18:58

​CISA has ordered federal agencies to secure their systems within three weeks against a high-severity Linux kernel flaw actively exploited in attacks. [...]

CISA tags Microsoft .NET and Apache OFBiz bugs as exploited in attacks
2025-02-05 16:45

The US Cybersecurity & Infrastructure Security Agency (CISA) has added four vulnerabilities to its Known Exploited Vulnerabilities catalog, urging federal agencies and large organizations to apply...

New Veeam Flaw Allows Arbitrary Code Execution via Man-in-the-Middle Attack
2025-02-05 12:16

Veeam has released patches to address a critical security flaw impacting its Backup software that could allow an attacker to execute arbitrary code on susceptible systems. The vulnerability,...

AsyncRAT Campaign Uses Python Payloads and TryCloudflare Tunnels for Stealth Attacks
2025-02-05 09:40

A malware campaign has been observed delivering a remote access trojan (RAT) named AsyncRAT by making use of Python payloads and TryCloudflare tunnels. "AsyncRAT is a remote access trojan (RAT)...

7-Zip MotW bypass exploited in zero-day attacks against Ukraine
2025-02-04 14:43

A 7-Zip vulnerability allowing attackers to bypass the Mark of the Web (MotW) Windows security feature was exploited by Russian hackers as a zero-day since September 2024. [...]

How to Prevent Phishing Attacks with Multi-Factor Authentication
2025-02-04 13:00

Learn how to protect yourself and your sensitive information from phishing attacks by implementing multi-factor authentication.

Abandoned AWS S3 buckets can be reused in supply-chain attacks that would make SolarWinds look 'insignificant'
2025-02-04 11:00

When cloud customers don't clean up after themselves, part 97 Abandoned AWS S3 buckets could be reused to hijack the global software supply chain in an attack that would make Russia's "SolarWinds...

Google fixes Android kernel zero-day exploited in attacks
2025-02-03 20:10

The February 2025 Android security updates patch 48 vulnerabilities, including a zero-day kernel vulnerability that has been exploited in the wild. [...]