Treasury Department slaps sanctions on IT security firms that it says supported Russia’s Foreign Intelligence Service carry out the attacks.
Source: Dark
[...]
Researchers uncover a fresh set of nine vulnerabilities in four TCP/IP stacks that are widely used in everything from powerful servers and firewalls
[...]
Analysis of threat activity in mission-critical environments prompts CISA advisory urging SAP customers to apply necessary security patches and updates.
Source: Dark
[...]
Telemetry suggests that threat actor behind Operation Dianxun is Mustang Panda, McAfee says.
Source: Dark Reading – Threat Intelligence – Chinese APT
[...]
F5 BIG-IP and BIG-IQ have multiple critical vulnerabilities that enable attackers to completely compromise systems.
Source: Dark Reading – Threat Intelligence –
[...]
Check Point researchers recently discovered the Clast82 dropper hidden in nine legitimate Android utility apps.
Source: Dark Reading – Threat Intelligence –
[...]