Adobe Acrobat Vulnerabilities Enable Remote Code Execution
A recent disclosure by Cisco Talos’ Vulnerability Discovery & Research team highlighted several vulnerability issues in Adobe Acrobat. All of these vulnerabilities have been addressed…
A recent disclosure by Cisco Talos’ Vulnerability Discovery & Research team highlighted several vulnerability issues in Adobe Acrobat. All of these vulnerabilities have been addressed…
The Malaysia Computer Emergency Response Team (MyCERT) has reported several Drupal vulnerabilities within its AI module, specifically affecting versions prior to 1.0.5. This issue, outlined in…
In 2024, a significant surge in hacking activities targeting social media and email accounts was reported, according to Action Fraud. The increase in cyber-crime complaints…
As artificial intelligence (AI) continues to evolve, so do the tactics employed by cybercriminals. AI-based cyber threats have become increasingly sophisticated, utilizing advanced algorithms to…
Hackers exploit a vulnerability in TP-Link routers, specifically the TL-WR845N model, to gain full control over the system. This exploit allows unauthorized users to access…
Packed with real-world case studies and practical examples, Cybersecurity Tabletop Exercises offers insights into how organizations have successfully leveraged tabletop exercises to identify security gaps…
IntelMQ is an open-source solution designed to help IT security teams (including CERTs, CSIRTs, SOCs, and abuse departments) streamline the collection and processing of security…
The former chief technology officer of Microsoft Australia Lee Hickin is to lead the federal government’s “reshaped” National AI Centre. Lee Hickin, National AI Centre…
Denmark warns of increased state-sponsored campaigns targeting the European telcos Pierluigi Paganini March 16, 2025 Denmark ‘s cybersecurity agency warns of increased state-sponsored campaigns targeting…
Optus has stood up a unified data platform that brings together data from across a number of repositories into an Azure-based ‘lakehouse’ environment running on…
Did you know that 43% of cyberattacks target small businesses, yet only 14% are prepared to defend themselves? For start-ups, the stakes are even higher.…
Origin Energy has elevated long-serving Alvin Rubyono to the role of chief information security officer (CISO). Rubyono has spent over 12 years with the energy…