WordPress Site vulnerability
17
Dec
2024

RCE Vulnerability in 1,000,000 WordPress Sites Lets Hackers Take Full Control

A critical Remote Code Execution (RCE) vulnerability (CVE-2024-6386), affecting over 1,000,000 active installations of the WordPress Multilingual Plugin (WPML). This…

17
Dec
2024

Texas Tech Systems Breach, Hackers Accessed System Folders & Files

The Texas Tech University Health Sciences Center (TTUHSC) and Texas Tech University Health Sciences Center El Paso (TTUHSC El Paso),…

RunSafe Security Platform enhances risk management with automation
17
Dec
2024

RunSafe Security Platform enhances risk management with automation

RunSafe Security has released the RunSafe Security Platform that automates risk identification, exploit prevention, and runtime software monitoring. Now, developers…

Cyber Threat Hunting
17
Dec
2024

5 Practical Techniques for Effective Cyber Threat Hunting

Addressing cyber threats before they have a chance to strike or inflict serious damage is by far the best security…

Top 10 datacentre stories of 2024
17
Dec
2024

Top 10 datacentre stories of 2024

The hype surrounding artificial intelligence (AI) has showed no signs of slowing down this year, and the impact of enterprises…

Russian FSB relies on Ukrainian minors for criminal activities disguised as "quest games"
17
Dec
2024

Russian FSB relies on Ukrainian minors for criminal activities disguised as “quest games”

Russia FSB relies on Ukrainian minors for criminal activities disguised as “quest games” Pierluigi Paganini December 17, 2024 Ukraine’s SBU…

WmRAT and MiyaRAT Malware
17
Dec
2024

Bitter APT Targets Turkish Defense Sector with WmRAT and MiyaRAT Malware

Dec 17, 2024Ravie LakshmananCyber Espionage / Malware A suspected South Asian cyber espionage threat group known as Bitter targeted a…

Tribunal criticises PSNI and Met Police for spying operation to identify journalists’ sources
17
Dec
2024

Tribunal criticises PSNI and Met Police for spying operation to identify journalists’ sources

Two Belfast journalists were unlawfully placed under surveillance by two UK police forces, which spied on their phone communications and…

Hackers Exploit Microsoft Management Console to Drop Backdoor Payloads on Windows
17
Dec
2024

Hackers Exploit Microsoft Management Console to Drop Backdoor on Windows

Securonix Threat Research team has uncovered a sophisticated tax-related phishing campaign that employs Microsoft Common Console Document (MSC) files and…

CoinLurker Malware
17
Dec
2024

Hackers Exploit Webview2 to Deploy CoinLurker Malware and Evade Security Detection

Bogus software update lures are being used by threat actors to deliver a new stealer malware called CoinLurker. “Written in…

IT Sustainability Think Tank: Green IT challenges and opportunities for 2025
17
Dec
2024

IT Sustainability Think Tank: Green IT challenges and opportunities for 2025

As we approach the end of 2024, the question of whether IT sustainability remains a priority in boardrooms is more…

Red Team Tools in RDP Attacks
17
Dec
2024

Hackers Leverage Red Team Tools in RDP Attacks Via TOR & VPN for Data Exfiltration

In a striking display of cyber sophistication, the advanced persistent threat (APT) group Earth Koshchei, also tracked as APT29 or…