Hackers Exploiting Azure Key Vault Access Policies To Read Sensitive Data
A critical security configuration in Azure Key Vault has been discovered, potentially allowing users with the Key Vault Contributor role to access sensitive data contrary…
A critical security configuration in Azure Key Vault has been discovered, potentially allowing users with the Key Vault Contributor role to access sensitive data contrary…
A newly disclosed security vulnerability, tracked under CVE-2024-12569, has been identified in Hikvision camera drivers integrated with Milestone’s XProtect® Device Pack. This vulnerability has raised…
The Cybersecurity and Infrastructure Security Agency (CISA) has unveiled an updated version of the National Cyber Incident Response Plan (NCIRP), a strategic framework for coordinating…
A sophisticated phishing campaign targeting European companies. The attack, which peaked in June 2024, aims to harvest Microsoft Azure cloud credentials and compromise victims’ cloud…
A critical security vulnerability tracked as CVE-2024-51479 has been identified in Next.js, a widely used React framework for building web applications. The flaw allowed unauthorized…
The Cybersecurity and Infrastructure Security Agency (CISA) has added four new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, highlighting significant security risks for various…
US authorities are considering a ban on TP-Link routers due to concerns over their potential role in Chinese cyber attacks. The popular router manufacturer, which…
The Cybersecurity and Infrastructure Security Agency (CISA) has issued a stark warning to senior government officials and political figures to adopt end-to-end encrypted messaging services…
A recent security investigation has uncovered a series of vulnerabilities in GStreamer, the open-source multimedia framework integral to GNOME-based Linux distributions. According to reports, vulnerabilities,…
Okta, a leading identity and access management platform, has issued a warning about an increase in sophisticated phishing attacks targeting its customers by impersonating the…
A sophisticated attack campaign leveraging Cloudflare’s Workers service to distribute malicious applications disguised as legitimate software. The Computer Emergency Response Team of Ukraine (CERT-UA) reported…
INTERPOL is advocating for a shift in terminology to combat online relationships and investment fraud. The international police organization is urging the replacement of the…