Let's Encrypt Announces 6-day Validity Certificates
17
Jan
2025

Let’s Encrypt Announces 6-day Validity Certificates

Let’s Encrypt, the non-profit certificate authority, has introduced six-day validity certificates, commonly referred to as short-lived certificates. This new offering,…

CISA Warns of Aviatrix Controllers OS Command Injection Vulnerability Exploited in Wild
17
Jan
2025

CISA Warns of Aviatrix Controllers OS Command Injection Vulnerability Exploited in Wild

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical alert regarding a significant OS command injection vulnerability in…

Naveen Goud
17
Jan
2025

NSA issues warning to iPhone users on data security

National Security Agency (NSA) of the United States has issued a global advisory for iPhone users regarding a device setting…

Homeowners are clueless about how smart devices collect their data
17
Jan
2025

Homeowners are clueless about how smart devices collect their data

Homeowners are increasingly concerned about data privacy in smart home products, according to Copeland. Homeowners see smart devices as boosting…

Russia-linked APT Star Blizzard targets WhatsApp accounts
17
Jan
2025

Russia-linked APT Star Blizzard targets WhatsApp accounts

Russia-linked APT Star Blizzard targets WhatsApp accounts Pierluigi Paganini January 17, 2025 The Russian group Star Blizzard targets WhatsApp accounts…

CISA Releases Recommendations For Closing Software Understanding Gap
17
Jan
2025

CISA Releases Recommendations For Closing Software Understanding Gap

The Cybersecurity and Infrastructure Security Agency (CISA), in collaboration with other federal agencies, has released a comprehensive report urging a…

BitMEX Fined $100 Million for Violating Bank Secrecy Act
17
Jan
2025

BitMEX Fined $100 Million for Violating Bank Secrecy Act

In a significant legal development, HDR Global Trading Ltd., operating under the name BitMEX, has been fined $100 million for…

Jane Devry
17
Jan
2025

How Video-Based Training Drives Compliance in Cybersecurity Policies

Cybersecurity threats are becoming more sophisticated, posing significant risks to organizations of all sizes. With sensitive data and critical systems…

Balancing usability and security in the fight against identity-based attacks
17
Jan
2025

Balancing usability and security in the fight against identity-based attacks

In this Help Net Security interview, Adam Bateman, CEO of Push Security, talks about the rise in identity-based attacks, how…

Active Directory Group Policy Bypassed To Allow NTLMv1 Authentications
17
Jan
2025

Active Directory Group Policy Bypassed To Allow NTLMv1 Authentications

Silverfort’s cybersecurity research team has uncovered a significant flaw in Microsoft’s Active Directory Group Policy that allows NTLMv1 authentication to…

Hackers Deploy Web Shell To Abuse IIS Worker And Exfiltrate Data
17
Jan
2025

Hackers Deploy Web Shell To Abuse IIS Worker And Exfiltrate Data

An attacker exploited a vulnerability in the batchupload.aspx and email_settings.aspx pages on the target server that allowed them to upload…

MSSqlPwner: Open-source tool for pentesting MSSQL servers
17
Jan
2025

MSSqlPwner: Open-source tool for pentesting MSSQL servers

MSSqlPwner is an open-source pentesting tool tailored to interact with and exploit MSSQL servers. Built on Impacket, it enables users…