article thumbnail

CISA shares a catalog of 306 actively exploited vulnerabilities

Security Affairs

The catalog includes vulnerabilities for products from Adobe, Apple, Atlassian, Cisco, Google, IBM, Microsoft, Nagios, Netgear, Oracle, Pulse Secure, and many other companies. The oldest vulnerability included in the catalog is the CVE-2010-5326? RCE in SAP NetWeaver Application Server and dates back to 2010.

Risk 106
article thumbnail

Volvo Cars suffers a data breach. Is it a ransomware attack?

Security Affairs

In 2010, Volvo Cars became a subsidiary of the Chinese manufacturer Geely Holding Group, which confirmed that it “has become aware that one of its file repositories has been illegally accessed by a third party.” Swedish automotive manufacturer Volvo Cars revealed that threat actors have stolen R&D data from its systems.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SJW Group Appoints James P. Lynch as Chief Accounting Officer, Andrew Walters as Chief Financial Officer; San Jose Water Appoints Peter Fletcher as Vice President – Information Security Officer

CyberSecurity Insiders

Peter Fletcher has been appointed vice president – information security officer of San Jose Water Co., Lynch, who had served as the CFO and treasurer since 2010, has taken on the role of CAO. a wholly owned subsidiary of SJW Group. The appointments were effective on Jan. The post SJW Group Appoints James P.

article thumbnail

German intelligence agency warns of China-linked APT27 targeting commercial organizations

Security Affairs

. “The Federal Office for the Protection of the Constitution ( BfV ) has information about an ongoing cyber espionage campaign by the cyber attack group APT27 using the malware variant HYPERBRO against German commercial companies.” ” reads the advisory published by the German intelligence.

article thumbnail

APT41 actors charged for attacks on more than 100 victims globally

Security Affairs

35, with 25, carried out cyber attacks on high-technology and similar organizations and video game companies. In August 2010, the same federal jury announced an indictment that charges Malaysian businessmen Wong Ong Hua, 46, and Ling Yang Ching, 32, for conspiring with two of the Chinese hackers. 35, and Tan Dailin (???),

article thumbnail

FBI and CISA joint alert blames Russia’s Energetic Bear APT for US government networks hack

Security Affairs

A joint security advisory published by The Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) revealed that Russia-linked APT group Energetic Bear has breached US government networks and exfiltrated data.

article thumbnail

SAP systems are targeted within 72 hours after updates are released

Security Affairs

Attackers attempted to accessing SAP systems to modify configurations and users and exfiltrate sensitive business information. According to the report, new unsecured SAP applications deployed in cloud (IaaS) environments are targeted by cyber attacks in less than three hours. ” concludes the report.

Risk 99