Remove tag security-rule
article thumbnail

Zimbra zero-day exploited to steal government emails by four groups

Security Affairs

Google TAG revealed that threat actors exploited a Zimbra Collaboration Suite zero-day ( CVE-2023-37580 ) to steal emails from governments. Google TAG researcher Clément Lecigne discovered the zero-day in June while investigating targeted attacks against Zimbra’s email server. ” reads the advisory published by Google TAG.

article thumbnail

News alert: Criminal IP and Quad9 collaborate to exchange domain and IP threat intelligence

The Last Watchdog

Enhanced threat blocking Quad9 is a free anycast DNS platform delivering robust security protections and privacy guarantees that comply with rigorous Swiss Data Protection and GDPR rules. Users can check their own credit usage for specific features (Web, Vulnerability Scanner, Tags, etc.)

Phishing 130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Crooks use HTML smuggling to spread QBot malware via SVG files

Security Affairs

The malicious HTML code is generated within the browser on the target device which is already inside the security perimeter of the victim’s network. . “SVG images are constructed using XML, allowing them to be placed within HTML using ordinary XML markup tags. ” reads the analysis published by Talos. Pierluigi Paganini.

article thumbnail

April 2021 Security Patch Day fixes a critical flaw in SAP Commerce

Security Affairs

April 2021 Security Patch Day includes 14 new security notes and 5 updates to previously released notes, one of them fixes a critical issue in SAP Commerce. SAP Security Note #3040210 , tagged with a CVSS score of 9.9 ” reads the advisory published by SAP security firm Onapsis. .”

Security 102
article thumbnail

Russia-linked Turla APT targets Austria, Estonia, and NATO platform

Security Affairs

SEKOIA researchers started their investigation after the publication of Google’s Threat Analysis Group (TAG)’s report “ Update on cyber activity in Eastern Europe ” which detailed the activity of nation-state actors against Eastern Europe. Please vote for Security Affairs and Pierluigi Paganini in every category that includes them (e.g.

article thumbnail

China: new rules on use of algorithms for digital business, data analytics and decision-making

DLA Piper Privacy Matters

The new “Administrative Regulations on Algorithm Recommendation of Internet Business Services” comes into force on 1 March 2022, and will introduce important rules on the use of algorithms when operating digital platforms/websites/apps – including targeted marketing – in China. Authors: Carolyn Bigg , Venus Cheung , Fangfang Song.

article thumbnail

Newly Proposed SEC Cybersecurity Risk Management and Governance Rules and Amendments for Public Companies

Data Matters

Securities and Exchange Commission (SEC) proposed new cybersecurity rules to enhance and standardize disclosures regarding cybersecurity risk management, strategy, governance, and incident reporting by public companies. The text of the proposed rules is available here. On March 9, 2022, the U.S.