CISA warns that vulnerable SimpleHelp RMM instances have been exploited against a utility billing software provider’s customers.
The post SimpleHelp Vulnerability Exploited Against Utility Billing Software Users appeared first on SecurityWeek.
Category Added in a WPeMatico Campaign
CISA warns that vulnerable SimpleHelp RMM instances have been exploited against a utility billing software provider’s customers.
The post SimpleHelp Vulnerability Exploited Against Utility Billing Software Users appeared first on SecurityWeek.
Multiple legitimate, unusual tools were used in a Fog ransomware attack, including one employed by Chinese hacking group APT41.
The post Fog Ransomware Attack Employs Unusual Tools appeared first on SecurityWeek.
Mitel has announced patches for a MiCollab path traversal vulnerability that can be exploited remotely without authentication.
The post Critical Vulnerability Exposes Many Mitel MiCollab Instances to Remote Hacking appeared first on SecurityWeek.
Trend Micro patches critical-severity Apex Central and Endpoint Encryption PolicyServer flaws leading to remote code execution.
The post Critical Vulnerabilities Patched in Trend Micro Apex Central, Endpoint Encryption PolicyServer appeared first on SecurityWeek.
ZeroRISC has raised $10 million in seed funding for production-grade open source silicon security, built on OpenTitan designs.
The post ZeroRISC Raises $10 Million for Open Source Silicon Security Solutions appeared first on SecurityWeek.
Citizen Lab publishes forensic proof that spyware maker Paragon can compromise up-to-date iPhones. Journalists in Europe among victims.
The post Paragon ‘Graphite’ Spyware Linked to Zero-Click Hacks on Newest iPhones appeared first on SecurityWeek.
AI-generated voice deepfakes have crossed the uncanny valley, fueling a surge in fraud that outpaces traditional security measures. Detection technology is racing to keep up.
The post The AI Arms Race: Deepfake Generation vs. Detection appeared first on SecurityWeek.
Hirundo tackles AI hallucinations and bias by making trained models “forget” poisoned, malicious, and confidential data.
The post Hirundo Raises $8 Million to Eliminate AI’s Bad Behavior appeared first on SecurityWeek.
The new attack technique uses smartwatches to capture ultrasonic covert communication in air-gapped environments and exfiltrate data.
The post New ‘SmartAttack’ Steals Air-Gapped Data Using Smartwatches appeared first on SecurityWeek.
Learn how attackers hide in plain sight—and what you can do to stop them without slowing down your business.
The post Webcast Video: Rethinking Endpoint Hardening for Today’s Attack Landscape appeared first on SecurityWeek.
