Cybersecurity For Businesses In 2025: Trends To Watch
02
Jan
2025

Cybersecurity For Businesses In 2025: Trends To Watch

Did you know cybercrime could cost the world $10.5 trillion annually by 2025? It’s a staggering number and a wake-up…

Lumen reports that it has locked out the Salt Typhoon group from its network
02
Jan
2025

Lumen reports that it has locked out the Salt Typhoon group from its network

Lumen reports that it has locked out the Salt Typhoon group from its network Pierluigi Paganini January 02, 2025 Lumen…

Top 10 Most Common Cyber Attacks of 2024
02
Jan
2025

Top 10 Most Common Cyber Attacks of 2024

The year 2024 marked a pivotal moment in the ever-evolving realm of cybersecurity as cyberattacks became more frequent, sophisticated, and…

EC2 Grouper Hackers Using AWS Tools To Exploit Compromised Credentials
02
Jan
2025

EC2 Grouper Hackers Using AWS Tools To Exploit Compromised Credentials

Cloud security researchers have uncovered alarming trends in identity compromises within Amazon Web Services (AWS) environments. Among the most prolific…

CERT-In Sounds Alarm On WPForms Plugin Exploit: Update Now
02
Jan
2025

CERT-In Sounds Alarm On WPForms Plugin Exploit: Update Now

The Vulnerability in Focus The vulnerability, present in WPForms plugin versions 1.8.4 through 1.9.2.1, stems from a missing authorization check…

EC2 Grouper Hackers Abusing AWS Tools to Attack With Compromised Credentials
02
Jan
2025

EC2 Grouper Hackers Abusing AWS Tools to Attack With Compromised Credentials

A sophisticated hacker group dubbed “EC2 Grouper” has been exploiting AWS tools and compromised credentials to launch attacks on cloud…

One of several selfies on the Facebook page of Cameron Wagenius.
02
Jan
2025

US Army soldier Arrested for Allegedly Selling Customer Call Records From AT&T & Verizon

A 20-year-old U.S. Army soldier, Cameron John Wagenius, has been arrested and indicted by federal authorities for allegedly selling confidential…

Exploited Vulnerability In PAN-OS Versions
02
Jan
2025

Exploited Vulnerability In PAN-OS Versions

The Cybersecurity and Infrastructure Security Agency (CISA) has expanded its Known Exploited Vulnerabilities (KEV) Catalog by adding a newly discovered…

D-Link Warns of Botnets Exploiting End-of-Life Routers
02
Jan
2025

D-Link Warns of Botnets Exploiting End-of-Life Routers

D-Link warned users of several legacy router models about known vulnerabilities actively exploited by botnets. These devices, which have reached…

CISOs don't invest enough in code security
02
Jan
2025

CISOs don’t invest enough in code security

72% of security leaders agree that the age of AI necessitates a complete reset of how organizations approach application security,…

When risky cybersecurity behavior becomes a habit among employees
02
Jan
2025

When risky cybersecurity behavior becomes a habit among employees

While the majority of employees avoid risky behaviors, a small subset makes them a habit, posing a significant cybersecurity challenge,…

Kata Containers: Open-source container runtime, building lightweight VMs
02
Jan
2025

Kata Containers: Open-source container runtime, building lightweight VMs

Kata Containers is an open-source project dedicated to creating a secure container runtime that combines the performance and simplicity of…