Several Horner PLC Software Vulnerabilities Allow Code Execution via Malicious Font Files
A cybersecurity researcher has discovered a total of seven high-severity remote code execution vulnerabilities in Horner Automation’s Cscape product and...
A cybersecurity researcher has discovered a total of seven high-severity remote code execution vulnerabilities in Horner Automation’s Cscape product and...
Dec 14, 2022Ravie LakshmananWebsite Security / Linux A new Go-based botnet has been spotted scanning and brute-forcing self-hosted websites using...
The hacker group also claimed to have breached the security of the US Federal Motor Carrier Safety Administration (FMCSA). The...
LockBit ransomware fell two spots to No. 3 in November as Royal and Cuba ransomware claimed the top two spots,...
News / National / CHR assails ‘abuses’ in use of cyber libel to curtail press freedom, free expression CHR assails...
An early version of the F-35 cockpit simulator. (Defense Department) WASHINGTON — Without working software, the F-35 stealth fighter is...
NEW YORK, NEW YORK – JUNE 13: Aryeh Bourkoff speaks during the 2022 Apollo Theater Spring Benefit at The Apollo...
Archaeologists in Egypt have discovered a 2,600-year-old tomb belonging to a man of high status: a "commander of foreign mercenaries"...
There have been major shifts in the GovCon landscape in recent years; with the rise of remote work, the increase...
This course has now passed, but you can be the first to know about the next one - and other...
[mc4wp_form id=”387″]
[mc4wp_form id=”387″]
Copyright © 2022 Cyber Affairs. All rights reserved.