Jane Devry
19
Dec
2024

The AI Threat: It’s Real, and It’s Here

We’re at a defining moment in cybersecurity that will determine organizational survival. Transform or be transformed by a competitor—this isn’t…

19
Dec
2024

CISA orders federal agencies to secure their Microsoft cloud environments

The US Cybersecurity and Infrastructure Security Agency (CISA) has issued a binding operational directive (BOD 25-01) requiring federal civilian agencies…

National Cyber Incident Response Plan
19
Dec
2024

CISA Released National Cyber Incident Response Plan (NCIRP)

The Cybersecurity and Infrastructure Security Agency (CISA) has unveiled an updated version of the National Cyber Incident Response Plan (NCIRP),…

Beware Of Malicious SharePoint Notifications That Delivers Xloader Malware
19
Dec
2024

Beware Of Malicious SharePoint Notifications That Delivers Xloader Malware

Through the use of XLoader and impersonating SharePoint notifications, researchers were able to identify a sophisticated malware delivery campaign.  A…

Jane Devry
19
Dec
2024

What SAP Security Can Learn From Successful European Football (Soccer) Teams

Team competitions like the European Football Championships repeatedly show that the supposed favorites do not always win. These competitions have…

Critical FortiWLM Flaw
19
Dec
2024

Fortinet Warns of Critical FortiWLM Flaw That Could Lead to Admin Access Exploits

Dec 19, 2024Ravie LakshmananVulnerability / Network Security Fortinet has issued an advisory for a now-patched critical security flaw impacting Wireless…

French court refuses to expedite trial of Sky ECC cryptophone distributor Thomas Herdman
19
Dec
2024

French court refuses to expedite trial of Sky ECC cryptophone distributor Thomas Herdman

Five judges will hear a case against 30 people accused of being involved in the distribution of encrypted mobile phones…

A New Cyber Attack Trend In 2024
19
Dec
2024

A New Cyber Attack Trend In 2024

In recent years, cyber attackers have continuously upgraded their tactics, exploiting a variety of tools and techniques to evade detection…

Beware Of New Phishing Attacks Stealing Microsoft Azure Cloud Logins
19
Dec
2024

New Phishing Attack Exploiting HubSpot Tools To Steal Microsoft Azure Logins

A sophisticated phishing campaign targeting European companies. The attack, which peaked in June 2024, aims to harvest Microsoft Azure cloud…

Next.js Vulnerability Let Attackers Bypass Authentication
19
Dec
2024

Next.js Vulnerability Let Attackers Bypass Authentication

A high-severity vulnerability has been discovered in the popular web framework, Next.js, which allows attackers to bypass authentication under specific…

Jane Devry
19
Dec
2024

Digital Trust Is Declining. Businesses Must Respond

Once a cornerstone of the digital promise, trust has been undermined by corporate misuse, data breaches, disinformation, and the growing…

Malware Disguised as Army+ App
19
Dec
2024

UAC-0125 Abuses Cloudflare Workers to Distribute Malware Disguised as Army+ App

Dec 19, 2024Ravie LakshmananDisinformation / Malware The Computer Emergency Response Team of Ukraine (CERT-UA) has disclosed that a threat actor…