Security News
![Over 20,000 vulnerable Microsoft Exchange servers exposed to attacks](/static/build/img/news/over-20000-vulnerable-microsoft-exchange-servers-exposed-to-attacks-small.jpg)
Tens of thousands of Microsoft Exchange email servers in Europe, the U.S., and Asia exposed on the public internet are vulnerable to remote code execution flaws. Internet scans from The ShadowServer Foundation show that there are close to 20,000 Microsoft Exchange servers currently reachable over the public internet that have reached the end-of-life stage.
![Apple slaps patch on WebKit holes in iPhones and Macs amid fears of active attacks](/static/build/img/news/apple-slaps-patch-on-webkit-holes-in-iphones-and-macs-amid-fears-of-active-attacks-small.jpg)
Apple has issued emergency fixes to plug security flaws in iPhones, iPads, and Macs that may already be under attack. iPad Pro 12.9-inch 2nd generation and later, iPad Pro 10.5-inch, iPad Pro 11-inch 1st generation and later, iPad Air 3rd generation and later, iPad 6th generation and later, and iPad mini 5th generation and later.
![Discover How Gcore Thwarted Powerful 1.1Tbps and 1.6Tbps DDoS Attacks](/static/build/img/news/discover-how-gcore-thwarted-powerful-1-1tbps-and-1-6tbps-ddos-attacks-small.jpg)
The most recent Gcore Radar report and its aftermath have highlighted a dramatic increase in DDoS attacks across multiple industries. At the beginning of 2023, the average strength of...
![LogoFAIL attack can install UEFI bootkits through bootup logos](/static/build/img/news/logofail-attack-can-install-uefi-bootkits-through-bootup-logos-small.jpg)
Multiple security vulnerabilities collectively named LogoFAIL affect image-parsing components in the UEFI code from various vendors. Discovering the LogoFAIL vulnerabilities started as a small research project on attack surfaces from image-parsing components in the context of custom or outdated parsing code in UEFI firmware.
![CACTUS Ransomware Exploits Qlik Sense Vulnerabilities in Targeted Attacks](/static/build/img/news/cactus-ransomware-exploits-qlik-sense-vulnerabilities-in-targeted-attacks-small.jpg)
A CACTUS ransomware campaign has been observed exploiting recently disclosed security flaws in a cloud analytics and business intelligence platform called Qlik Sense to obtain a foothold into...
![Iranian Hackers Exploit PLCs in Attack on Water Authority in U.S.](/static/build/img/news/iranian-hackers-exploit-plcs-in-attack-on-water-authority-in-u-s-small.jpg)
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) revealed that it's responding to a cyber attack that involved the active exploitation of Unitronics programmable logic controllers...
![Japan's space agency suffers cyber attack, points finger at Active Directory](/static/build/img/news/japan-s-space-agency-suffers-cyber-attack-points-finger-at-active-directory-small.jpg)
Japan's Space Exploration Agency has reported a cyber incident. Chief cabinet secretary Matsuno mentioned the incident in his morning briefing, telling reporters the agency suspected a breach, possibly to its Active Directory implementation, so conducted further research and found illegal access.
![Enterprises prepare for the inevitable cyber attack](/static/build/img/news/enterprises-prepare-for-the-inevitable-cyber-attack-small.jpg)
Recent IDC research shows that in many cases, senior executives/line-of-business leaders are minimally engaged in their company's cyber preparedness initiatives. 52% of senior leaders have no involvement in their company's cyber cases.
![Zero-Day Alert: Google Chrome Under Active Attack, Exploiting New Vulnerability](/static/build/img/news/zero-day-alert-google-chrome-under-active-attack-exploiting-new-vulnerability-small.jpg)
Google has rolled out security updates to fix seven security issues in its Chrome browser, including a zero-day that has come under active exploitation in the wild. Tracked as CVE-2023-6345, the...
![New BLUFFS attack lets attackers hijack Bluetooth connections](/static/build/img/news/new-bluffs-attack-lets-attackers-hijack-bluetooth-connections-small.jpg)
Researchers at Eurecom have developed six new attacks collectively named 'BLUFFS' that can break the secrecy of Bluetooth sessions, allowing for device impersonation and man-in-the-middle attacks. BLUFFS is a series of exploits targeting Bluetooth, aiming to break Bluetooth sessions' forward and future secrecy, compromising the confidentiality of past and future communications between devices.