Hackers Exploit Tomcat Vulnerability to Hijack Apache Servers
17
Mar
2025

Hackers Exploit Tomcat Vulnerability to Hijack Apache Servers

A recent and significant cybersecurity threat has emerged involving a critical vulnerability in Apache Tomcat, identified as CVE-2025-24813. This vulnerability…

Hackers Use CSS Tricks to Bypass Spam Filters and Monitor Users
17
Mar
2025

Hackers Use CSS Tricks to Bypass Spam Filters and Monitor Users

Cybersecurity experts have uncovered how hackers use Cascading Style Sheets (CSS) to deceive spam filters and monitor user behavior. This…

week in security
17
Mar
2025

A week in security (March 10 – March 16)

March 14, 2025 – A shocking amount of iOS apps in Apple’s App Store contained hard-coded secrets. Secrets that could…

Fraudulent Emails
17
Mar
2025

Fraudulent Emails Claiming To Be From CSA And SPF

The Singapore Cyber Emergency Response Team (SingCERT) has issued a warning regarding the rise in fraudulent emails, with scammers impersonating…

Adobe Acrobat Vulnerabilities Enable Remote Code Execution
17
Mar
2025

Adobe Acrobat Vulnerabilities Enable Remote Code Execution

A recent disclosure by Cisco Talos’ Vulnerability Discovery & Research team highlighted several vulnerability issues in Adobe Acrobat. All of…

Drupal Vulnerabilities
17
Mar
2025

MyCERT Advises To Patch Critical Drupal Vulnerabilities Now

The Malaysia Computer Emergency Response Team (MyCERT) has reported several Drupal vulnerabilities within its AI module, specifically affecting versions prior to…

Naveen Goud
17
Mar
2025

Social Media and Email hacking surged in 2024

In 2024, a significant surge in hacking activities targeting social media and email accounts was reported, according to Action Fraud….

Naveen Goud
17
Mar
2025

Technical Tips to Evade AI-Based Cyber Threats

As artificial intelligence (AI) continues to evolve, so do the tactics employed by cybercriminals. AI-based cyber threats have become increasingly…

Hackers Target TP-Link Vulnerability to Gain Full System Control
17
Mar
2025

Hackers Target TP-Link Vulnerability to Gain Full System Control

Hackers exploit a vulnerability in TP-Link routers, specifically the TL-WR845N model, to gain full control over the system. This exploit…

17
Mar
2025

Review: Cybersecurity Tabletop Exercises – Help Net Security

Packed with real-world case studies and practical examples, Cybersecurity Tabletop Exercises offers insights into how organizations have successfully leveraged tabletop…

17
Mar
2025

IntelMQ: Open-source tool for collecting and processing security feeds

IntelMQ is an open-source solution designed to help IT security teams (including CERTs, CSIRTs, SOCs, and abuse departments) streamline the…

"Reshaped" National AI Centre to be run by ex-Microsoft Australia CTO - Cloud - Software
17
Mar
2025

“Reshaped” National AI Centre to be run by ex-Microsoft Australia CTO – Cloud – Software

The former chief technology officer of Microsoft Australia Lee Hickin is to lead the federal government’s “reshaped” National AI Centre….