7-Zip 0-Day Exploit Leaked Online Allows Attackers Control Victim Devices Remotely
31
Dec
2024

7-Zip 0-Day Exploit Leaked Online Allows Attackers Control Victim Devices Remotely

A previously unknown zero-day vulnerability in the popular file compression tool 7-Zip has been publicly disclosed by an anonymous user…

SquareX Researchers Uncover OAuth Vulnerability in Chrome Extensions Days Before Major Breach
31
Dec
2024

SquareX Researchers Uncover OAuth Vulnerability in Chrome Extensions Days Before Major Breach

SquareX, an industry-first Browser Detection and Response (BDR) solution, leads the way in browser security. About a week ago, SquareX reported…

Protect SAP Supply Chains by Preventing Cyber Attacks
31
Dec
2024

Protect SAP Supply Chains by Preventing Cyber Attacks

Highly advanced and extremely dangerous cyberattacks are targeting SAP (from the company originally called “System Analysis Program” Development) software supply…

CISA Warns of Palo Alto Networks PAN-OS Vulnerability Exploited in Wild
31
Dec
2024

CISA Warns of Palo Alto Networks PAN-OS Vulnerability Exploited in Wild

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a high-priority alert on a critical vulnerability in Palo Alto…

Collaborative transport optimisation helps towards decarbonisation goals
31
Dec
2024

Collaborative transport optimisation helps towards decarbonisation goals

University of Cambridge research suggests most of the freight moved around the UK to serve retailers, hospitality and other sectors…

NFS Protocol Security Bypassed To Access Files From Remote Server
31
Dec
2024

NFS Protocol Security Bypassed To Access Files From Remote Server

The NFS protocol offers authentication methods like AUTH_SYS, which relies on untrusted user IDs, and Kerberos, providing cryptographic verification.  While…

Bulk Data Transfers
31
Dec
2024

New U.S. DoJ Rule Halts Bulk Data Transfers to Adversarial Nations to Protect Privacy

Dec 31, 2024Ravie LakshmananData Security / Privacy The U.S. Department of Justice (DoJ) has issued a final rule carrying out…

Harley-Davidson Data Breach – Threat Actor Allegedly Leaked Customer Details
31
Dec
2024

Harley-Davidson Data Breach – Threat Actor Allegedly Leaked Customer Details

Harley-Davidson, the iconic American motorcycle manufacturer, has reportedly fallen victim to a significant data breach orchestrated by a cybercriminal group…

Harley-Davidson Data Breach – Threat Actor Allegedly Leaked Customer Details
31
Dec
2024

Harley-Davidson Data Breach – Threat Actor Allegedly Leaked Customer Details

Harley-Davidson, the iconic American motorcycle manufacturer, has reportedly fallen victim to a significant data breach orchestrated by a cybercriminal group…

Hackers Weaponize Websites With LNK File To Deliver Weaponized LZH File
31
Dec
2024

Hackers Weaponize Websites With LNK File To Deliver Weaponized LZH File

The watering hole attack leverages a compromised website to deliver malware. When a user visits the infected site, their system…

Veritas Vulnerability Let Attackers Execute Arbitrary SQL Commands
31
Dec
2024

Veritas Vulnerability Let Attackers Execute Arbitrary SQL Commands

A newly discovered vulnerability in Veritas/Arctera Data Insight software (versions 7.1 and prior) highlights a significant security concern, allowing attackers…

US Treasury Department Breach, Hackers Accessed Workstations
31
Dec
2024

US Treasury Department Breach, Hackers Accessed Workstations

The Biden administration confirmed that a Chinese state-sponsored hacking group breached the U.S. Treasury Department, gaining unauthorized access to employee…