A team of researchers claim attackers can exploit a vulnerability on Amazon's EC2 cloud storage platform in order to steal the cryptographic keys of other users. The researchers from Worcester Polytechnic...
The malware is being deployed in real-world attacks by hackers working for Russian military intelligence unit, they state
The vulnerabilities have now been patched by Microsoft
Citrix has addressed five vulnerabilities in its CEM solution
Seventeen bugs are rated as "critical" meaning they can be easily exploited by hackers to gain full control of a vulnerable machine
Smaug RaaS makes it easy for threat actors to use ransomware to achieve their objectives