This post was originally published on 3 May 2022 Update 27 May 2022 Following the hacking of Spanish governmental phones, Spain’s prime minister Pedro Sánchez, will be bringing forward new legislation to regulate and oversee the nation’s spy agencies: Spain’s PM vows to reform intelligence services following phone hacking scandal …
Have you been to an MGM Resort? If so then may be it is your personal information doing the rounds on Telegram?
The headline says it all. About 142 million customer records were stolen from MGM Resorts, the data included names, addresses, email addresses, phone numbers, and dates of birth. Rich pickings for any threat actor. MGM’s data breach was over two years ago and the data has been on sale since …
More vulnerabilities to be aware of… Including Microsoft, Adobe, Linux and Google Chrome
The US Cybersecurity and Infrastructure Security Agency is having a busy week of updating it’s Known Exploited Vulnerabilities Catalog: CISA Adds 34 Known Exploited Vulnerabilities to Catalog | CISA Microsoft and Adobe figure strongly on the list today but there are other products there – go and check. There is …
Twenty more known vulnerabilities added to the CISA database
Following yesterday’s post, more vulnerabilities have been added to the Cybersecurity and Infrastructure Security Agency’s (CISA) Known Exploited Vulnerabilities Catalog. Yesterday: Twenty-one additions to the known exploited database! – Smart Thinking Solutions Today: CISA Adds 20 Known Exploited Vulnerabilities to Catalog | CISA Microsoft, Apple and Cisco figure highly among …
Continue reading “Twenty more known vulnerabilities added to the CISA database”
Twenty-one additions to the known exploited database!
It has been a busy couple of weeks for those threat actors and now the Cybersecurity and Infrastructure Security Agency (CISA) has caught up and added twenty-one known exploits this week – so far. CISA Adds 21 Known Exploited Vulnerabilities to Catalog | CISA Many mainstream products are in the …
Continue reading “Twenty-one additions to the known exploited database!”
