Multiple flaws in Volkswagen Group's infotainment unit allow for vehicle compromise
16
Dec
2024

Multiple flaws in Volkswagen Group’s infotainment unit allow for vehicle compromise

Multiple flaws in Volkswagen Group’s infotainment unit allow for vehicle compromise Pierluigi Paganini December 16, 2024 Researchers discovered multiple flaws…

Rhode Island Cyberattack Exposes Personal Data Of Thousands
16
Dec
2024

Rhode Island Cyberattack Exposes Personal Data Of Thousands

Rhode Island is tackling with a major cybersecurity breach that has compromised the personal information of thousands of residents. The…

Tic TAC Alert: A Remote Code Execution Vulnerability in Medical Imaging
16
Dec
2024

A Remote Code Execution Vulnerability in Medical Imaging

A critical Remote Code Execution (RCE) vulnerability has been discovered in a popular open-source biomedical tool used worldwide. This vulnerability,…

week in security
16
Dec
2024

A week in security (December 9 – December 15)

December 13, 2024 – Care1, a Canadian healthcare solutions provider left a cloud storage instance freely accessible and unencrypted for…

Cyble Sensor Intelligence Report Surge In Vulnerabilities
16
Dec
2024

Cyble Sensor Intelligence Report Surge In Vulnerabilities

The latest Sensor Intelligence Report from Cyble, dated December 4–10, 2024, sheds light on a troubling increase in cyber threats,…

Naveen Goud
16
Dec
2024

Cybersecurity News Headlines Trending on Google

Surge in Passkey Security Adoption in 2024 Tech giants such as Google, Amazon, Microsoft, and Facebook are leading the charge…

Cyber Ops and Reconnaissance
16
Dec
2024

Ukrainian Minors Recruited for Cyber Ops and Reconnaissance in Russian Airstrikes

Dec 16, 2024Ravie LakshmananCyber Attack / Cyber Espionage The Security Service of Ukraine (SBU or SSU) has exposed a novel…

Authorities Use Novispy Spyware & Cellebrite Forensic Tools to Hack Journalists
16
Dec
2024

Authorities Use Novispy Spyware & Cellebrite Forensic Tools to Hack Journalists

 Serbian police and intelligence services have been reported to use advanced phone spyware in conjunction with mobile forensic tools to…

Naveen Goud
16
Dec
2024

How Man-in-the-Middle Attacks Can Be Thwarted

Man-in-the-middle (MITM) attacks are a significant cybersecurity threat, where an attacker intercepts and potentially alters communication between two parties without…

Security Risks Of Exposed Human Machine Interfaces In WWS
16
Dec
2024

Security Risks Of Exposed Human Machine Interfaces In WWS

The Cybersecurity and Infrastructure Security Agency (CISA) and the Environmental Protection Agency (EPA) have jointly released a crucial fact sheet…

malicious Google Search Ads
16
Dec
2024

Hackers Exploiting Google Search Ads to Launch Malvertising Campaigns

Threat researchers have identified a persistent series of malvertising campaigns targeting graphic design professionals, using Google Search ads as a…

With DORA approaching, financial institutions must strengthen their cyber resilience
16
Dec
2024

With DORA approaching, financial institutions must strengthen their cyber resilience

The clock is ticking for financial institutions across the EU as the January 17, 2025, deadline for the Digital Operational…