Skip to content
SECURITYICT

SECURITYICT

  • Home
  • Services
  • Resources
  • Blog
  • Contact
Search
SECURITYICT
Close menu
  • Home
  • Services
  • Resources
  • Blog
  • Contact
SECURITYICT
Search Toggle menu
March 24, 2023March 24, 2023Vulnerabilities

OpenAI: ChatGPT payment data leak caused by open-source bug

OpenAI says a Redis client open-source library bug was behind Monday’s ChatGPT outage and data leak, where users saw other users’ personal […]

Read more
March 24, 2023April 24, 2023Security Bugs, Wordpress

Critical WooCommerce Payments Plugin Flaw Patched for 500,000+ WordPress Sites

Automattic, the company behind the WordPress content management system, is force installing a security update on hundreds of thousands of websites running […]

Read more
March 23, 2023March 23, 2023InfoStealer, Malware

North Korean hackers using Chrome extensions to steal Gmail emails

A joint cybersecurity advisory from the German Federal Office for the Protection of the Constitution (BfV) and the National Intelligence Service of […]

Read more
March 22, 2023April 23, 2023CISA, Critical Infrastructure, ICS

CISA Alerts on Critical Security Vulnerabilities in Industrial Control Systems

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released eight Industrial Control Systems (ICS) advisories on Tuesday, warning of critical flaws […]

Read more
March 21, 2023March 21, 2023InfoStealer, Malware

DotRunpeX: The Malware That Infects Systems with Multiple Families

Currently, DotRunpeX malware appears to be primarily distributed through phishing emails and malicious Google Ads, presenting a significant threat to users’ systems. […]

Read more
March 21, 2023March 21, 2023InfoStealer

Hackers target .NET developers with malicious NuGet packages

Threat actors are targeting and infecting .NET developers with cryptocurrency stealers delivered through the NuGet repository and impersonating multiple legitimate packages via […]

Read more
March 21, 2023March 21, 2023Ransomware

Emotet malware now distributed in Microsoft OneNote files to evade defenses

The Emotet malware is now distributed using Microsoft OneNote email attachments, aiming to bypass Microsoft security restrictions and infect more targets. Emotet […]

Read more
March 21, 2023April 7, 2023Linux, Malware

New ShellBot DDoS Malware Variants Targeting Poorly Managed Linux Servers

Poorly managed Linux SSH servers are being targeted as part of a new campaign that deploys different variants of a malware called […]

Read more
March 21, 2023March 21, 2023Crypto, Zero-Day Vulnerability

General Bytes Bitcoin ATMs hacked using zero-day, $1.5M stolen

Leading Bitcoin ATM maker General Bytes disclosed that hackers stole cryptocurrency from the company and its customers using a zero-day vulnerability in […]

Read more
March 21, 2023March 21, 2023Ransomware

Ferrari discloses data breach after receiving ransom demand

Ferrari has disclosed a data breach following a ransom demand received after attackers gained access to some of the company’s IT systems. […]

Read more

Posts pagination

< 1 2 3 4 >

Recent Posts

  • Strengthening Cybersecurity: Our Penetration Testing Services
  • A Success Story in the US Telecommunications Sector
  • The European Cybersecurity Landscape: Opportunities and Challenges for MSSP
  • ICT Academy CERT: Empowering Industries Through Digital Safety
  • Securing Tomorrow: ICT Academy CERT SOC Incident Response Team

Recent Comments

No comments to show.

Archives

  • January 2025
  • December 2024
  • April 2024
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023

Categories

  • Apple
  • APT
  • CISA
  • Compliance
  • Critical Infrastructure
  • Crypto
  • CyberCrime
  • ICS
  • InfoStealer
  • IoT
  • Linux
  • MacOS
  • Malware
  • News
  • OT
  • Patch
  • Penetration Testing
  • Phishing
  • Ransomware
  • Security Bugs
  • usecase
  • Vulnerabilities
  • Wordpress
  • work
  • Zero Trust
  • Zero-Day Vulnerability

Recent Posts

  • Strengthening Cybersecurity: Our Penetration Testing Services
  • A Success Story in the US Telecommunications Sector
  • The European Cybersecurity Landscape: Opportunities and Challenges for MSSP
  • ICT Academy CERT: Empowering Industries Through Digital Safety
  • Securing Tomorrow: ICT Academy CERT SOC Incident Response Team

Recent Comments

    Archives

    • January 2025
    • December 2024
    • April 2024
    • June 2023
    • May 2023
    • April 2023
    • March 2023
    • February 2023

    Categories

    • Apple
    • APT
    • CISA
    • Compliance
    • Critical Infrastructure
    • Crypto
    • CyberCrime
    • ICS
    • InfoStealer
    • IoT
    • Linux
    • MacOS
    • Malware
    • News
    • OT
    • Patch
    • Penetration Testing
    • Phishing
    • Ransomware
    • Security Bugs
    • usecase
    • Vulnerabilities
    • Wordpress
    • work
    • Zero Trust
    • Zero-Day Vulnerability
    © 2025 SECURITYICT
    part of ICT Academy.