Security Affairs newsletter Round 306

Pierluigi Paganini March 21, 2021

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for you in your email box.

If you want to also receive for free the international press subscribe here.

Experts found 15 flaws in Netgear JGS516PE switch, including a critical RCE
Google releases Spectre PoC code exploit for Chrome browser
Google fixes the third actively exploited Chrome 0-Day since January
NCSC is not aware of ransomware attacks compromising UK orgs through Microsoft Exchange bugs
ProxyLogon Microsoft Exchange exploit is completely out of the bag by now
US DoJ indicted the CEO of Sky Global encrypted chat platform
Is there a link between Microsoft Exchange exploits and PoC code the company shared with partner security firms?
Magecart hackers hide captured credit card data in JPG file
Microsoft releases On-premises Mitigation Tool (EOMT) tool to fix ProxyLogon issues
New Mirai variant appears in the threat landscape
China-linked hackers target telcos to steal 5G secrets
Data Breaches Tracker monitor unsecured ElasticSearch servers online
FBI warns of PYSA Ransomware attacks against Education Institutions in US and UK
New ZHtrap botnet uses honeypot to find more victims
SolarWinds hackers stole some of Mimecast source code
China-linked APT31 group was behind the attack on Finnish Parliament
Expert found a 1-Click RCE in the TikTok App for Android
Prime Minister Boris Johnson wants to enhance UK cyber capabilities
Reading the FBI IC3s ‘2020 Internet Crime Report
WINTRIAGE: THE TRIAGE TOOL FOR WINDOWS DFIRERS
XcodeSpy Mac malware targets Xcode Developers with a backdoor
CISA and FBI warn of ongoing TrickBot attacks
Millions of People Can Lose Sensitive Data through Travel Apps, Privacysavvy reports
Millions of sites could be hacked due to flaws in popular WordPress plugins
Russian National pleads guilty to conspiracy to plant malware on Tesla systems
Threat actors are attempting to exploit CVE-2021-22986 in F5 BIG-IP devices in the wild
Why Focusing on Container Runtimes Is the Most Critical Piece of Security for EKS Workloads?

If you want to receive the weekly Security Affairs Newsletter for free subscribe here.

Follow me on Twitter: @securityaffairs and Facebook

[adrotate banner=”9″][adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – hacking, newsletter)

[adrotate banner=”5″]

[adrotate banner=”13″]



you might also like

leave a comment