Security concerns spur New Zealand to regulate who can monitor satellites – Security – Telco/ISP
The New Zealand government will pass legislation next year to prevent entities that “do not share the country’s values” from using it as a base…
The New Zealand government will pass legislation next year to prevent entities that “do not share the country’s values” from using it as a base…
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Microsoft fixes exploited zero-day (CVE-2024-49138)On December 2024 Patch Tuesday, Microsoft…
PUMAKIT, a sophisticated rootkit that uses advanced stealth mechanisms Pierluigi Paganini December 15, 2024 Researchers discovered PUMAKIT, a Linux rootkit capable of hiding files, escalating…
Welcome to this week’s Cyber Security Newsletter, where we delve into the latest developments and crucial updates in cybersecurity. Your involvement in this rapidly changing…
In the ever-evolving landscape of cryptography, traditional encryption methods safeguarding data at rest and in transit remain foundational to cybersecurity strategies. However, the security of…
A critical security flaw has been discovered in the popular data transfer tool Curl, potentially allowing attackers to access sensitive information. The vulnerability, identified as…
The original version of this story appeared in Quanta Magazine. For thousands of years, if you wanted to send a secret message, there was basically…
The holiday season is largely characterized by a significant rise in consumer spending, and digital deals for Black Friday and Cyber Monday have advanced the…
IOCONTROL cyberweapon used to target infrastructure in the US and Isreael Pierluigi Paganini December 14, 2024 Iran-linked threat actors target IoT and OT/SCADA systems in…
Russian cyberspies Gamaredon has been discovered using two Android spyware families named ‘BoneSpy’ and ‘PlainGnome’ to spy on and steal data from mobile devices. According…
A threat actor tracked as MUT-1244 has stolen over 390,000 WordPress credentials in a large-scale, year-long campaign targeting other threat actors using a trojanized WordPress…
U.S. CISA adds Cleo Harmony, VLTrader, and LexiCom flaw to its Known Exploited Vulnerabilities catalog Pierluigi Paganini December 14, 2024 U.S. Cybersecurity and Infrastructure Security Agency…