Data Breaches, Vulnerabilities, Cyber Attacks, & Other Updates
Welcome to this week’s Cybersecurity Newsletter, where you will find the latest updates and insights from the cybersecurity world. Stay informed and protected with our…
Welcome to this week’s Cybersecurity Newsletter, where you will find the latest updates and insights from the cybersecurity world. Stay informed and protected with our…
Okta, a leading company in identity and access management, has recently addressed a critical vulnerability in its AD/LDAP Delegated Authentication system. Okta’s security team internally…
LastPass, the popular password management service, has issued an urgent warning to its users about an ongoing social engineering campaign targeting customers through fake reviews…
In a coordinated international effort, authorities have conducted a significant crackdown on cybercrime, arresting two suspects, seizing online platforms used for narcotics trafficking, and executing…
Microsoft has warned Azure Virtual Desktop (AVD) users about potential black screen issues lasting up to 30 minutes when logging in after installing the July…
Let’s not sugarcoat it: phishing is one of the most effective ways cybercriminals worm their way into your network. Why? Simple. As Stephanie Carruthers, a…
A new variant of the notorious FakeCall malware has been discovered, using advanced vishing (voice phishing) techniques to deceive users and take near-total control of…
A sophisticated attack that compromised an entire domain by exploiting a critical vulnerability in Microsoft SharePoint. The attack, which remained undetected for two weeks, showcases…
A critical security flaw has been discovered in Hikvision network cameras that could allow attackers to intercept Dynamic DNS (DDNS) credentials transmitted in cleartext, potentially…
A severe security vulnerability in qBittorrent, affecting versions 3.2.1 through 5.0.0, has been discovered that allowed attackers to perform remote code execution (RCE) through multiple…
Carrying out malware analysis might seem like a lengthy and complex task, but with the right tools and practices, it can actually be done in…
Hackers target Telegram for malware distribution due to its security flaws and user-friendly features that facilitate file sharing. The anonymity and large user base of…