Information Security (Page 63)

Since the beginning of November, experts reported some cases of WordPress websites attacked with an alleged ransomware variant that turned out to be a fake threat were identified. Upon enteringRead More →

Cybersecurity specialists report that threat actors could track the online activity of Tor browser users to extract potentially sensitive information. This attack variant is known as Website Fingerprinting (WF). ThisRead More →

A few months ago a group of researchers discovered the ChaosDB vulnerability, a severe flaw in the Azure Cosmos DB database solution whose exploitation would allow threat actors to accessRead More →

The team in charge of GoCD announced the fix of three vulnerabilities that could be exploited in a chained manner to take full control of the underlying server. These flawsRead More →

In its latest security alert, Hewlett Packard Enterprise (HPE) confirmed that the data repositories of its Aruba Central software solution were tapped by threat actors, who could access sensitive information.Read More →

After having been the victim of a ransomware attack a few weeks ago, the Toronto Transit Commission (TTC) confirmed that the information of thousands of employees and users could haveRead More →

Palo Alto Networks security team has issued a statement alerting its customers to a remote code execution (RCE) vulnerability in GlobalProtect, mentioning that threat actors can launch malicious code withRead More →

The developers of Apache Storm, an open-source real time data analysis platform, announced the correction of two vulnerabilities whose exploitation would allow remote code execution (RCE) attacks to be deployed.Read More →