NAO flags shortcomings in government preferential pricing deals with big tech suppliers
23
Jan
2025

NAO flags shortcomings in government preferential pricing deals with big tech suppliers

The government’s multi-year, volume pricing discount deals with the likes of Microsoft and Amazon Web Services (AWS) are under scrutiny…

Next.js Framework Exposes Websites To Cache Poisoning & XSS Attacks
23
Jan
2025

Next.js Framework Exposes Websites To Cache Poisoning & XSS Attacks

A critical vulnerability, identified as CVE-2024-46982, has been discovered in the popular Next.js framework, widely used for building full-stack web…

Subaru Security Flaws Exposed Its System for Tracking Millions of Cars
23
Jan
2025

Subaru Security Flaws Exposed Its System for Tracking Millions of Cars

Curry and Shah reported their findings to Subaru in late November, and Subaru quickly patched its Starlink security flaws. But…

SonicWall
23
Jan
2025

SonicWall Urges Immediate Patch for Critical CVE-2025-23006 Flaw Amid Likely Exploitation

Jan 23, 2025Ravie LakshmananVulnerability / Network Security SonicWall is alerting customers of a critical security flaw impacting its Secure Mobile…

Cisco Meeting Management
23
Jan
2025

Cisco Meeting Management REST API Vulnerability

Cisco has issued a security advisory regarding a critical privilege escalation vulnerability found in Cisco Meeting Management. The vulnerability is…

Researcher Jailbreaking an AI's System Prompt Through Creativity
23
Jan
2025

Researcher Jailbreaking an AI’s System Prompt Through Creativity

In a remarkable display of creativity, a researcher showcased how an artificial intelligence (AI) system’s tightly guarded “system prompt” could…

SonicWall Arbitrary OS Commands Execution Vulnerability Exploited in Attacks
23
Jan
2025

SonicWall Arbitrary OS Commands Execution Vulnerability Exploited in Attacks

 A critical vulnerability in SonicWall’s SMA1000 series tracked as CVE-2025-23006, has come under active exploitation by threat actors. SonicWall’s PSIRT (Product…

How to Eliminate Identity-Based Threats
23
Jan
2025

How to Eliminate Identity-Based Threats

Despite significant investments in advanced technologies and employee training programs, credential and user-based attacks remain alarmingly prevalent, accounting for 50-80%…

Inside The Latest Ransomware Threat
23
Jan
2025

Inside The Latest Ransomware Threat

Cybersecurity threats continue to evolve, and the latest reports reveal a ransomware campaign targeting AWS S3 buckets functionality. This campaign…

Sending Billions of Daily Requests Without Breaking Things with our Rate Limiter
23
Jan
2025

Sending Billions of Daily Requests Without Breaking Things with our Rate Limiter

At Detectify, we help customers secure their attack surface. To effectively and comprehensively test their assets, we must send a…

Under Trump, US Cyberdefense Loses Its Head
23
Jan
2025

Under Trump, US Cyberdefense Loses Its Head

Chinese hacks, rampant ransomware, and Donald Trump’s budget cuts all threaten US security. In an exit interview with WIRED, former…

Murdoc Botnet Exploiting AVTECH Cameras & Huawei Routers to Gain Complete Control
23
Jan
2025

Murdoc Botnet Exploiting AVTECH Cameras & Huawei Routers to Gain Complete Control

Researchers have identified an active malware campaign involving a Mirai botnet variant, dubbed Murdoc, which has been targeting AVTECH cameras…