$577M Cryptocurrency Fraud: Estonian Nationals Admit Guilt
17
Feb
2025

$577M Cryptocurrency Fraud: Estonian Nationals Admit Guilt

Two Estonian nationals have admitted their roles in planning a massive cryptocurrency Ponzi scheme that defrauded hundreds of thousands of…

IDOR vulnerability in ExHub Let Attacker Modify Web Hosting Configuration
17
Feb
2025

IDOR vulnerability in ExHub Let Attacker Modify Web Hosting Configuration

A critical Insecure Direct Object Reference (IDOR) vulnerability was recently discovered in ExHub, a cloud-based platform for hulia-based development.  This…

New Golang-Based Backdoor Uses Telegram Bot API for Evasive C2 Operations
17
Feb
2025

New Golang-Based Backdoor Uses Telegram Bot API for Evasive C2 Operations

Feb 17, 2025Ravie LakshmananThreat Intelligence / Cyber Attack Cybersecurity researchers have shed light on a new Golang-based backdoor that uses…

Opinion: Saudi plans to be an IT superpower, but challenges lie ahead
17
Feb
2025

Opinion: Saudi plans to be an IT superpower, but challenges lie ahead

Saudi Arabia is spending big on IT, and on artificial intelligence (AI) in particular, in an effort to diversify from…

whoAMI attack could allow remote code execution within AWS account
17
Feb
2025

whoAMI attack could allow remote code execution within AWS account

whoAMI attack could allow remote code execution within AWS account Pierluigi Paganini February 17, 2025 Researchers warn that the whoAMI…

Multiple Russian Actors Attacking Orgs To Hack Microsoft 365 Accounts via Device Code Authentication
17
Feb
2025

Multiple Russian Actors Attacking Orgs To Hack Microsoft 365 Accounts via Device Code Authentication

Security researchers at Volexity have uncovered multiple Russian threat actors conducting sophisticated social engineering and spear-phishing campaigns targeting Microsoft 365…

RAG AI: ‘Do it yourself,’ says NYC data scientist
17
Feb
2025

RAG AI: ‘Do it yourself,’ says NYC data scientist

Organisations should build their own generative artificial intelligence-based (GenAI-based) on retrieval augmented generation (RAG) with open sources products such as…

Android 16 Blocks Scammers With In-Call Security Features
17
Feb
2025

Android 16 Blocks Scammers With In-Call Security Features

Google is working to enhance the security of its mobile operating system, focusing on preventing scammers from exploiting certain phone…

Indian Post Office Portal Exposed Thousands of KYC Records With Username & Mobile Number
17
Feb
2025

Indian Post Office Portal Exposed Thousands of KYC Records With Username & Mobile Number

The Indian Post Office portal was found vulnerable to an Insecure Direct Object Reference (IDOR) attack, exposing sensitive Know Your…

A path to better data engineering
17
Feb
2025

A path to better data engineering

Today’s data landscape presents unprecedented challenges for organisations, due to the need for businesses to process thousands of documents in…

Beware of Fake Outlook Troubleshooting Calls that Ends Up In Ransomware Deployment
17
Feb
2025

Beware of Fake Outlook Troubleshooting Calls that Ends Up In Ransomware Deployment

A sophisticated cyber threat has emerged in recent weeks, targeting unsuspecting users with fake Outlook troubleshooting calls. These calls, designed…

week in security
17
Feb
2025

A week in security (February 10 – February 16)

February 14, 2025 – A cybercriminal stole a reported 12 million data records on Zacks’ customers and clients. February 13,…