Protecting Against Bot-Enabled API Abuse
04
Dec
2024

Protecting Against Bot-Enabled API Abuse

APIs have become the backbone of modern digital ecosystems, powering everything from mobile apps to e-commerce platforms. However, as APIs…

SolarWinds Platform XSS Vulnerability Let Attackers Inject Malicious Code
04
Dec
2024

SolarWinds Platform XSS Vulnerability Let Attackers Inject Malicious Code

A critical security vulnerability has been recently disclosed by SolarWinds in its Platform product, a major player in IT management…

New TLDs Such as .shop, .top and .xyz Leveraged by Phishers
04
Dec
2024

New TLDs Such as .shop, .top and .xyz Leveraged by Phishers

Phishing attacks have surged nearly 40% in the year ending August 2024, with a significant portion of this increase linked…

Product showcase: Securing Active Directory passwords with Specops Password Policy
04
Dec
2024

Product showcase: Securing Active Directory passwords with Specops Password Policy

Password policies are a cornerstone of cybersecurity for any organization. A good password policy ensures every end user has a…

Major Global Takedown
04
Dec
2024

Europol Dismantles Criminal Messaging Service MATRIX in Major Global Takedown

Europol on Tuesday announced the takedown of an invite-only encrypted messaging service called MATRIX that’s created by criminals for criminal…

Oracle Java licensing explained: Addressing complexity, cost and audits
04
Dec
2024

Oracle Java licensing explained: Addressing complexity, cost and audits

Organisations using Java face a licence fee hike after Oracle’s introduction of subscription pricing for Java SE. Analyst Forrester has previously written…

Azercell Cybersecurity Training For Elderly In Azerbaijan
04
Dec
2024

Azercell Cybersecurity Training For Elderly In Azerbaijan

Azercell, the leading mobile operator in Azerbaijan, is offering cybersecurity training to its customers, particularly the elderly. As part of…

HR & IT-Related Phishing Emails Are Top-Clicked Among Phishing Email Types
04
Dec
2024

HR & IT-Related Phishing Emails Are Top-Clicked Among Phishing Email Types

Phishing emails masquerading as HR and IT-related communications are the most likely to be clicked on by employees as unveiled…

Cisco Urges Immediate Patch for Decade-Old WebVPN Vulnerability
04
Dec
2024

Cisco Urges Immediate Patch for Decade-Old WebVPN Vulnerability

SUMMARY: Critical Patch Alert: Cisco ASA users must urgently address a 10-year-old WebVPN vulnerability (CVE-2014-2120) that attackers are now actively…

HackSynth An Autonomous Penetration Testing Framework For Simulating Cyber-Attacks
04
Dec
2024

HackSynth An Autonomous Penetration Testing Framework For Simulating Cyber-Attacks

The introduction of HackSynth marks a significant advancement in the field of autonomous penetration testing. Developed by researchers at Eotvos…

Authorities Take Down Criminal Encrypted Messaging Platform MATRIX
04
Dec
2024

Authorities Take Down Criminal Encrypted Messaging Platform MATRIX

SUMMARY MATRIX Encrypted Platform Shut Down: Authorities dismantled MATRIX, an encrypted messaging service used by criminals. Millions of Messages Intercepted:…

PoC exploit for critical WhatsUp Gold RCE vulnerability released (CVE-2024-8785)
04
Dec
2024

PoC exploit for critical WhatsUp Gold RCE vulnerability released (CVE-2024-8785)

Researchers have published a proof-of-concept (PoC) exploit for CVE-2024-8785, a critical remote code execution vulnerability affecting Progress WhatsUp Gold, a…