Advanced Privacy Protection with Browser Profile Isolation
08
Jan
2025

Advanced Privacy Protection with Browser Profile Isolation

A browser extension named PRIVESHIELD automatically creates isolated profiles to group websites based on browsing history and user interaction, which…

Critical Vulnerabilities in Moxa Routers Allow Root Privilege Escalation
08
Jan
2025

Critical Vulnerabilities in Moxa Routers Allow Root Privilege Escalation

Critical security vulnerabilities have been found in Moxa cellular routers and network security appliances. Learn about CVE-2024-9138 & CVE-2024-9140, including…

Chinese hack of US telecoms compromised more firms than previously known
08
Jan
2025

Chinese hack of US telecoms compromised more firms than previously known – Security

A Chinese hack compromised even more US telecoms than previously known, including Charter Communications, Consolidated Communications and Windstream. Hackers also…

Meta replaces fact-checking with community notes post 'Cultural Tipping Point'
08
Jan
2025

Meta replaces fact-checking with community notes post ‘Cultural Tipping Point’

Meta replaces fact-checking with community notes post ‘Cultural Tipping Point’ Pierluigi Paganini January 08, 2025 Meta is replacing its fact-checking…

PHP Servers Vulnerability Exploited To Inject PacketCrypt Cryptocurrency Miner
08
Jan
2025

PHP Servers Vulnerability Exploited To Inject PacketCrypt Cryptocurrency Miner

A significant PHP server vulnerability identified as CVE-2024-4577 was exploited to inject PacketCrypt Classic Cryptocurrency Miner. This PHP CGI Argument…

Washington state Filed Lawsuit Against T-Mobile Massive Data Breach
08
Jan
2025

Washington state Filed Lawsuit Against T-Mobile Massive Data Breach

Washington State Attorney General Bob Ferguson filed a consumer protection lawsuit against T-Mobile for its alleged failure to secure sensitive…

Top 6 Ways To Back Your Business Up With Cyber Threat Intelligence
08
Jan
2025

Top 6 Ways To Back Your Business Up With Cyber Threat Intelligence

Threat intelligence is a cornerstone of a reliable cybersecurity framework. It implies gathering information about сyber threats, analyzing them, and…

All-in-One Open-Source Secure Mail Server with JMAP, IMAP4, POP3, and SMTP
08
Jan
2025

All-in-One Open-Source Secure Mail Server with JMAP, IMAP4, POP3, and SMTP

Stalwart is an innovative open-source mail server solution that supports JMAP, IMAP4, POP3, and SMTP, offering a comprehensive suite of…

U.S. CISA adds Oracle WebLogic Server and Mitel MiCollab flaws to its Known Exploited Vulnerabilities catalog
08
Jan
2025

U.S. CISA adds Oracle WebLogic Server and Mitel MiCollab flaws to its Known Exploited Vulnerabilities catalog

U.S. CISA adds Oracle WebLogic Server and Mitel MiCollab flaws to its Known Exploited Vulnerabilities catalog Pierluigi Paganini January 08, 2025…

image
08
Jan
2025

Security Risk Advisors joins the Microsoft Intelligent Security Association

Security Risk Advisors today announced it has become a member of the Microsoft Intelligent Security Association (MISA), an ecosystem of…

Critical BIOS/UEFI Vulnerabilities Enable Attackers To Overwrite System Firmware
08
Jan
2025

Critical BIOS/UEFI Vulnerabilities Enable Attackers To Overwrite System Firmware

Researchers discovered critical BIOS/UEFI vulnerabilities in the Illumina iSeq 100 DNA sequencer, where the device utilizes an outdated firmware implementation…

Naveen Goud
08
Jan
2025

State-Funded Actors Are Driving the Ransomware Threat Landscape

For years, ransomware groups have sought innovative ways to maximize profits during their peak operations. However, according to the latest…