You might be interested in …

[BleepingComputer] Bluetooth flaws allow attackers to impersonate legitimate devices

Attackers could abuse vulnerabilities discovered in the Bluetooth Core and Mesh Profile specifications to impersonate legitimate devices during the pairing process and launch man-in-the-middle (MitM) attacks. […] Source: Read More (BleepingComputer)

Read More

[ThreatPost] Millions of Java Apps Remain Vulnerable to Log4Shell

All posts, ThreatPost

Four months after the critical flaw was discovered, attackers have a massive attack surface from which they can exploit the flaw and take over systems, researchers found. Source: Read More (Threatpost)

Read More

[TheRecord] Traffic at major Ukrainian internet service provider Ukrtelecom disrupted

Web traffic from major Ukrainian internet service provider Ukrtelecom was disrupted Monday, causing one of the most widespread internet outages in the country since Russian troops invaded late last month. Global network monitors, including NetBlocks and Kentik, flagged traffic disruptions involving the provider Monday. “On Monday 28 March, a major cyberattack on Ukraine’s national provider […]

Read More

Leave a Reply

Your email address will not be published.

This site uses Akismet to reduce spam. Learn how your comment data is processed.