Dozens of insecure-by-design flaws found in vendor OT products
A new research project from OT:ICEFALL has uncovered 56 vulnerabilities in operational technology (OT) devices from 10 different vendors.
A new research project from OT:ICEFALL has uncovered 56 vulnerabilities in operational technology (OT) devices from 10 different vendors.
A proof-of-concept exploit could make Office 365 or Microsoft 365 documents stored on OneDrive or SharePoint inaccessible.
Researchers warn of a new worm that's infecting Linux servers by brute-forcing and stealing SSH credentials.
Researchers have come across a stealthy Linux backdoor that uses sophisticated techniques to hide itself on compromised servers and steal credentials.
Atlassian has issued emergency patches for the vulnerability, which could allow attackers to perform remote code execution.
Leaked Conti information show the ransomware gang likely completed a proof of concept to exploit Intel ME and rewrite its firmware.
The Conti ransomware group is less likely to help victims restore encrypted files and more likely to leak exfiltrated data.
The actively exploited flaw allows attackers to use malicious Word documents to perform remote code execution through Microsoft Support Diagnostic Tool.
The paid Assured Open Source Software service will offer common open source packages after vetting the provenance of its code and dependencies.
Malware researchers warn about a stealthy backdoor program that has been used by a Chinese threat actor to compromise Linux servers around the world.
The network switch vulnerabilities are considered critical and could allow attackers to break network segmentation, exfiltrate data, and escape captive portals.
Although the vulnerabilities were patched server-side, they allowed privilege escalation and authentication bypass.
Among the over 100 vulnerabilities fixed by Microsoft during the past week in its monthly patch cycle is one that has the security community very worried.
The new cryptomining malware is written in Go for easier deployment and uses Amazon Web Services' own open-source Go libraries.
A new ransomware operation dubbed LokiLocker has slowly been gaining traction since August among cyber criminals, researchers warn.
Innovation Awards is the market-leading awards program for celebrating ecosystem innovation and excellence across the technology sector in Australia.
EDGE is the leading technology conference for business leaders in Australia and New Zealand, built on the foundations of collaboration, education and advancement.