August 2024 Patch Tuesday forecast: Looking for a calm August release
July ended up being more ‘exciting’ than many of us wanted; we’re supposed to be in the height of summer vacation season. First, we had…
July ended up being more ‘exciting’ than many of us wanted; we’re supposed to be in the height of summer vacation season. First, we had…
Aug 09, 2024Ravie LakshmananIoT Security / Wireless Security Cybersecurity researchers have uncovered weaknesses in Sonos smart speakers that could be exploited by malicious actors to…
The European Union’s landmark cyber security bill NIS2 is just months away from coming into force. With a compliance deadline of 17 October, the law aims to…
A recent investigation by Cyble Research and Intelligence Lab (CRIL) revealed a new phishing scheme employed by Latrodectus and ACR Stealer. This campaign involves a…
CSC ServiceWorks, a leading provider of commercial laundry services and air vending solutions, has disclosed a data breach after the personal information of an undisclosed…
In November 2023, hackers from Iran hacked the Municipal Water Authority of Aliquippa, Pennsylvania. They targeted a vulnerable control system and damaged it with anti-Israel…
There is a grand tradition at the annual Defcon security conference in Las Vegas of hacking ATMs. Unlocking them with safecracking techniques, rigging them to…
A sophisticated phishing campaign targeting Windows systems leverages multiple evasion techniques, including Python obfuscation, shellcode generation, and loading, to deploy a payload of malware. This…
For many, this news might seem trivial as it doesn’t involve direct harm to humans. However, the recent death of a cow and her calf…
09 Aug Former White House CIO Theresa Payton Shares Election Security Insights Posted at 08:57h in Blogs by Di Freeze This week in cybersecurity from…
A “0.0.0.0-Day” vulnerability affecting Chrome, Safari and Firefox can be – and has been – exploited by attackers to gain access to services on internal…
Electronic surveillance equipment provider ADT filed a form 8-K with the Security and Exchange Commision (SEC) to report “a cybersecurity incident during which unauthorized actors…