Hackers Seize Control of 3,000 Companies Through Critical Vulnerabilities
29
Jan
2025

Hackers Seize Control of 3,000 Companies Through Critical Vulnerabilities

In a groundbreaking cybersecurity investigation, researchers identified several critical vulnerabilities in a target system, eventually gaining control over 3,000 subsidiary…

Naveen Goud
29
Jan
2025

Whitehall vulnerable to Cyber Attacks and malware threats

Whitehall, a term that refers both to the British government administration and a specific geographic location in central London, has…

Zyxel Unpatched Vulnerability
29
Jan
2025

Zyxel CPE Devices Face Active Exploitation Due to Unpatched CVE-2024-40891 Vulnerability

Jan 29, 2025Ravie LakshmananVulnerability / Network Security Cybersecurity researchers are warning that a critical zero-day vulnerability impacting Zyxel CPE Series…

Attackers exploit SimpleHelp RMM Software flaws for initial access
29
Jan
2025

Attackers exploit SimpleHelp RMM Software flaws for initial access

Attackers exploit SimpleHelp RMM Software flaws for initial access Pierluigi Paganini January 29, 2025 Threat actors exploit recently fixed SimpleHelp…

Hackerone logo
29
Jan
2025

Women in sales brings unique strengths and perspectives to the table

Earlier this year, I was part of a HackerOne team that developed the Women in Sales Employee Resource Group (ERG)….

Fake DeepSeek Campaign Attacking macOS Users to Deliver Poseidon Malware
29
Jan
2025

Fake DeepSeek Campaign Attacking macOS Users to Deliver Poseidon Malware

A new cyberattack campaign, dubbed the “Fake DeepSeek Campaign,” has been discovered targeting macOS users. DeepSeek, a Chinese-developed AI chatbot, has…

Vulnerability in Airline Integration Service enables A Hacker to Gain Entry To User Accounts
29
Jan
2025

Vulnerability in Airline Integration Service enables A Hacker to Gain Entry To User Accounts

A recent security vulnerability in a widely used airline integration service has exposed millions of users to account takeovers, raising…

Naveen Goud
29
Jan
2025

Data Engineers Should Be Aware of These Cloud Security Challenges

As organizations continue to migrate to the cloud to enhance scalability, flexibility, and cost efficiency, the role of data engineers…

Australia Invests $6.4M To Boost Healthcare Cybersecurity
29
Jan
2025

Australia Invests $6.4M To Boost Healthcare Cybersecurity

The Australian government has announced a $6.4 million grant to the Critical Infrastructure – Information Sharing and Analysis Centre (CI-ISAC)…

VMware Avi Load Balancer
29
Jan
2025

Broadcom Warns of High-Severity SQL Injection Flaw in VMware Avi Load Balancer

Jan 29, 2025Ravie LakshmananVulnerability / Software Security Broadcom has alerted of a high-severity security flaw in VMware Avi Load Balancer…

Azure Key Vault Vulnerabilities Could Leak Sensitive Data After Entra ID Breach
29
Jan
2025

Azure Key Vault Vulnerabilities Could Leak Sensitive Data After Entra ID Breach

A detailed walkthrough demonstrates how attackers can manipulate Azure Key Vault’s access policies after compromising Entra ID (formerly Azure AD)…

TP-Link Router Web Interface XSS Vulnerability
29
Jan
2025

TP-Link Router Web Interface XSS Vulnerability

A recently discovered Cross-site Scripting (XSS) vulnerability, CVE-2024-57514, affecting the TP-Link Archer A20 v3 Router has raised security concerns among…