Category: Uncategorized


The Media Trust’s Digital Security & Operations (DSO) team discovered a new malicious campaign affecting iPhone users of over 100 publisher websites, many of which were UK online newspapers and international weekly news magazines. Continue reading

SPPA-T3000 Application Server and MS3000 Migration Server are affected by multiple vulnerabilities. Some of the vulnerabilities can allow an attacker to execute arbitrary code on the server. Exploitation of the vulnerabilities described in this advisory requires access to either Application- or Automation Highway. Continue reading

We are saddened to report that on December 2, 2019, the Rooster Teeth online store (https://store.roosterteeth.com/) experienced a data security incident that may have compromised a limited group of customers’ personal information. Continue reading

(CNN)New Orleans Mayor LaToya Cantrell declared a state of emergency Friday after the city was hit by a cyberattack. Continue reading

Microsoft Threat Intelligence Center (MSTIC) is raising awareness of the ongoing activity by a group we call GALLIUM, targeting telecommunication providers. When Microsoft customers have been targeted by this activity, we notified them directly with the relevant information they need to protect themselves. Continue reading

tl;dr – Update to npm v6.13.4 as soon as possible on all your systems to fix a vulnerability allowing arbitrary path access. Continue reading

The malware’s dropper is a skeleton that avoids detection as a malicious file.

Continue reading

There’s a well-worn saying in security: “If it’s too good to be true, then it probably isn’t.” This can easily be applied to the myriad of online stores that sell counterfeit goods—and now attract secondary fraud in the form of a credit card skimmer. Continue reading

Intel issued a firmware update on Tuesday to mitigate an attack, dubbed Plundervolt, which uses voltage fluctuations to reveal secrets such as encryption keys. Continue reading

What if you could walk into a room and make every* iPhone or iPad unusable while you’re there? Wait, that sounds evil. What if you could get that one annoying person off their iPhone who’s always on it? Continue reading