FCC
17
Jan
2025

FCC orders telecoms to secure their networks after Salt Tyhpoon hacks

The Federal Communications Commission (FCC) has ordered U.S. telecommunications carriers to secure their networks following last year’s Salt Typhoon security…

U.S. CISA adds Aviatrix Controllers vulnerability to its Known Exploited Vulnerabilities catalog
17
Jan
2025

U.S. CISA adds Aviatrix Controllers vulnerability to its Known Exploited Vulnerabilities catalog

U.S. CISA adds Aviatrix Controllers vulnerability to its Known Exploited Vulnerabilities catalog Pierluigi Paganini January 17, 2025 U.S. Cybersecurity and…

GoDaddy
17
Jan
2025

FTC orders GoDaddy to fix poor web hosting security practices

The Federal Trade Commission (FTC) will require web hosting giant GoDaddy to implement basic security protections, including HTTPS APIs and mandatory…

Naveen Goud
17
Jan
2025

Microsoft exposes WhatsApp Spear Phishing Campaign of Star Blizzard

Microsoft’s Threat Intelligence teams have uncovered and exposed a spear phishing campaign targeting WhatsApp accounts, attributed to the Russian-linked hacker…

How Russian hackers went after NGOs' WhatsApp accounts
17
Jan
2025

How Russian hackers went after NGOs’ WhatsApp accounts

Star Blizzard, a threat actor tied to the Russian Federal Security Service (FSB), was spotted attempting to compromise targets’ WhatsApp…

Researchers say AI fails to describe complexities of Holocaust
17
Jan
2025

Researchers say AI fails to describe complexities of Holocaust

Existing artificial intelligence (AI) models available in the public domain fail to provide “complexities and nuances of the past”, and…

Windows 11
17
Jan
2025

Microsoft starts force upgrading Windows 11 22H2, 23H3 devices

​Microsoft has started the forced rollout of Windows 11 24H2 to eligible, non-managed systems running the Home and Pro editions…

Growing Enterprise Data is Creating Big Cybersecurity Risk
17
Jan
2025

Growing Enterprise Data is Creating Big Cybersecurity Risk

Buzz about big data permeated tech conversations in the mid-1990s, but people today don’t talk as much about big data…

Critical Flaws in WGS-804HPT Switches Enable RCE and Network Exploitation
17
Jan
2025

Critical Flaws in WGS-804HPT Switches Enable RCE and Network Exploitation

Jan 17, 2025Ravie LakshmananFirmware Security / Vulnerability Cybersecurity researchers have disclosed three security flaws in Planet Technology’s WGS-804HPT industrial switches…

Why CIO tenures are getting shorter .... and why it matters
17
Jan
2025

Why CIO tenures are getting shorter …. and why it matters

It is widely acknowledged that CIOs (and other tech leaders such as CTOs) on average spend a relatively short time…

It's Easier Than Ever To Hack. Newbies Gone Phishing.
17
Jan
2025

It’s Easier Than Ever To Hack. Newbies Gone Phishing.

Cyberattacks have become increasingly sophisticated, with more advanced technologies than ever at the disposal of cybercriminals. In 2025, cybercrime damages…

PHP Servers
17
Jan
2025

Python-Based Bots Exploiting PHP Servers Fuel Gambling Platform Proliferation

Jan 17, 2025Ravie LakshmananWeb Security / Botnet Cybersecurity researchers have exposed a new campaign that targets web servers running PHP-based…