Hacker
14
Dec
2024

390,000 WordPress accounts stolen from hackers in supply chain attack

A threat actor tracked as MUT-1244 has stolen over 390,000 WordPress credentials in a large-scale, year-long campaign targeting other threat…

U.S. CISA adds Cleo Harmony, VLTrader, and LexiCom flaw to its Known Exploited Vulnerabilities catalog
14
Dec
2024

U.S. CISA adds Cleo Harmony, VLTrader, and LexiCom flaw to its Known Exploited Vulnerabilities catalog

U.S. CISA adds Cleo Harmony, VLTrader, and LexiCom flaw to its Known Exploited Vulnerabilities catalog Pierluigi Paganini December 14, 2024 U.S….

A complete guide to finding advanced file upload vulnerabilities
14
Dec
2024

A complete guide to finding advanced file upload vulnerabilities

File upload vulnerabilities are fun to find, they are impactful by nature and in some cases even result in remote…

Benefits of Network Monitoring Systems
14
Dec
2024

Benefits of Network Monitoring Systems

Maintaining a resilient, secure, and efficient network infrastructure is more important than ever. Network monitoring systems, which encompass both hardware…

BADBOX Malware
14
Dec
2024

Germany Disrupts BADBOX Malware on 30,000 Devices Using Sinkhole Action

Dec 14, 2024Ravie LakshmananBotnet / Ad Fraud Germany’s Federal Office of Information Security (BSI) has announced that it has disrupted…

Passkey
14
Dec
2024

Password Era is Ending ” Microsoft to Delete 1 Billion Password to Replace “Passkey

In a significant turn towards a passwordless future, Microsoft has announced groundbreaking strides in adopting passkeys, a secure and user-friendly…

Microsoft’s AI Recall Tool Is Still Sucking Up Credit Card and Social Security Numbers
14
Dec
2024

Microsoft’s AI Recall Tool Is Still Sucking Up Credit Card and Social Security Numbers

What a week! On Monday, police arrested 26-year-old Luigi Mangione and charged him in the murder of UnitedHealthcare CEO Brian…

Jane Devry
14
Dec
2024

CSC 2025 Predictions: From Surges in AI-Generated Malware to Machine Learning in SOCs

The threat landscape continues to evolve, and companies around the world face escalating risks heading into 2025. As AI enables…

Jane Devry
14
Dec
2024

Addressing the Disconnect in External Attack Surface Awareness

External vulnerability scans have become a staple in the cybersecurity toolkit of most organizations. Similar to a penetration test, external…

Yokai Backdoor Campaign
14
Dec
2024

Thai Officials Targeted in Yokai Backdoor Campaign Using DLL Side-Loading Techniques

Dec 14, 2024Ravie LakshmananMalware / Cyber Threat Thai government officials have emerged as the target of a new campaign that…

Jane Devry
14
Dec
2024

Legacy VPNs: A Ticking Time Bomb for Modern Organizations

In an era defined by the exponential growth of digital transformation, traditional Virtual Private Network (VPN) solutions have become a…

30,000 Devices in Germany Discovered with Pre-installed Malware “Badbox”
14
Dec
2024

30,000 Devices in Germany Discovered with Pre-installed Malware “Badbox”

The Federal Office for Information Security (BSI) in Germany has taken decisive action against a wave of malware-infected digital picture…