Post Office scandal in 2024 – part 1: A year in the mainstream
11
Dec
2024

Post Office scandal in 2024 – part 1: A year in the mainstream

This year saw a scandal in the making for over 20 years finally arrive in the public consciousness in January,…

HTML Functions Exploited  to Bypass Email Security Filters
11
Dec
2024

Hackers Exploiting HTML Functions to Bypass Email Security Filters

Cybercriminals increasingly leverage sophisticated HTML techniques to circumvent email security filters, putting users and organizations at greater risk of falling…

Chrome Security Update, Patch For Multiple Vulnerabilities
11
Dec
2024

Chrome Security Update, Patch For Multiple Vulnerabilities

72 Hours to Audit-Ready API Security APIs present a unique challenge in this landscape, as risk assessment and mitigation are…

Naveen Goud
11
Dec
2024

Apple iPhone Users Warned About Data-Stealing Vulnerability in TCC Feature

Apple iPhone users are being alerted to a critical security flaw that could potentially allow hackers to steal sensitive data….

Actively Exploited CLFS Vulnerability
11
Dec
2024

Microsoft Fixes 72 Flaws, Including Patch for Actively Exploited CLFS Vulnerability

Microsoft closed out its Patch Tuesday updates for 2024 with fixes for a total of 72 security flaws spanning its…

Cybercriminals Impersonate Dubai Police to Defraud Consumers in the UAE
11
Dec
2024

Cybercriminals Impersonate Dubai Police to Defraud Consumers in the UAE

Cybercriminals Impersonate Dubai Police to Defraud Consumers in the UAE – Smishing Triad in Action Pierluigi Paganini December 11, 2024…

Ivanti CSA Vulnerabilities
11
Dec
2024

Multiple Ivanti CSA Vulnerabilities Let Attackers Bypass Admin Web Console Remotely

Ivanti has released crucial security updates to address multiple vulnerabilities in its Cloud Services Application (CSA) software, including critical flaws…

Naveen Goud
11
Dec
2024

Pros and Cons of Differentiating Cloud Security Tools

As organizations increasingly migrate their operations to the cloud, securing sensitive data and ensuring privacy have become top priorities. Cloud…

U.S. Charges Chinese Hacker for Exploiting Zero-Day in 81,000 Sophos Firewalls
11
Dec
2024

U.S. Charges Chinese Hacker for Exploiting Zero-Day in 81,000 Sophos Firewalls

Dec 11, 2024Ravie LakshmananVulnerability / Data Breach The U.S. government on Tuesday unsealed charges against a Chinese national for allegedly…

WPForms Vulnerability Let Users Issues Subscription Payments
11
Dec
2024

WPForms Vulnerability Let Users Issues Subscription Payments

A critical security vulnerability, tracked as CVE-2024-11205, was recently discovered in the popular WordPress plugin, WPForms, which boasts over 6 million…

Containers have 600+ vulnerabilities on average
11
Dec
2024

Containers have 600+ vulnerabilities on average

Containers are the fastest growing – and weakest cybersecurity link – in software supply chains, according to NetRise. Companies are…

Open source malware up 200% since 2023
11
Dec
2024

Open source malware up 200% since 2023

Sonatype’s 2024 Open Source Malware Threat Report reveals that the number of malicious packages has surpassed 778,500 since tracking began…