AWS Warns of Multiple Vulnerabilities in Amazon WorkSpaces, Amazon AppStream 2.0, & Amazon DCV
17
Jan
2025

AWS Warns of Multiple Vulnerabilities in Amazon WorkSpaces, Amazon AppStream 2.0, & Amazon DCV

Amazon Web Services (AWS) has issued a critical security advisory highlighting vulnerabilities in specific versions of its native clients for…

Lords debate government approach to automated decision-making
17
Jan
2025

Lords debate government approach to automated decision-making

The UK government has expressed “reservations” about legislative proposals from Lord Tim Clement-Jones to improve the scrutiny of algorithmic decision-making…

Exploring the Vishing Threat Landscape
17
Jan
2025

Exploring the Vishing Threat Landscape

Voice phishing, also known as vishing, represents a growing threat to organizations worldwide. Keepnet’s 2024 Vishing Response Report illuminates the…

New 'Sneaky 2FA' Phishing Kit Targets Microsoft 365 Accounts with 2FA Code Bypass
17
Jan
2025

New ‘Sneaky 2FA’ Phishing Kit Targets Microsoft 365 Accounts with 2FA Code Bypass

Jan 17, 2025Ravie LakshmananCybersecurity / Threat Intelligence Cybersecurity researchers have detailed a new adversary-in-the-middle (AitM) phishing kit that’s capable of…

Enterprises need to make better choices to reduce GenAI emissions
17
Jan
2025

Enterprises need to make better choices to reduce GenAI emissions

The mounting environmental impacts of generative artificial intelligence (GenAI) systems can be significantly reduced if businesses “choose the right model”…

CISA Warns of Aviatrix Controllers OS Command Injection Vulnerability Exploited in Wild
17
Jan
2025

CISA Warns of Aviatrix Controllers OS Command Injection Vulnerability Exploited in Wild

The Cybersecurity and Infrastructure Security Agency (CISA) has added a critical vulnerability affecting Aviatrix Controllers to its Known Exploited Vulnerabilities…

New Tool Unveiled to Scan Hacking Content on Telegram
17
Jan
2025

New Tool Unveiled to Scan Hacking Content on Telegram

A Russian software developer, aided by the National Technology Initiative, has introduced a groundbreaking AI module designed to monitor and…

Why Many New AI Tools Aren’t Available In Europe - And How To Access Them
17
Jan
2025

Why Many New AI Tools Aren’t Available In Europe

Explore how AI tools like OpenAI’s Sora face restrictions in Europe due to GDPR, with insights on bypassing geo-restrictions and…

U.S. Sanctions North Korean IT Worker Network Supporting WMD Programs
17
Jan
2025

U.S. Sanctions North Korean IT Worker Network Supporting WMD Programs

Jan 17, 2025Ravie LakshmananInsider Threat / Cryptocurrency The U.S. Treasury Department’s Office of Foreign Assets Control (OFAC) sanctioned two individuals…

LinkedIn Job Scams: A New Cyber Threat
17
Jan
2025

LinkedIn Job Scams: A New Cyber Threat

For many professionals, LinkedIn is a lifeline—a platform to connect, grow, and land the next big opportunity. But for some…

Now Microsoft Teams Let Users Customize Banner Notification Positions
17
Jan
2025

Now Microsoft Teams Let Users Customize Banner Notification Positions

Microsoft has unveiled a much-anticipated feature for its Teams platform: the ability to customize the position of banner notifications on…

FlowerStorm PaaS Platform Attacking Microsoft Users With Fake Login Pages
17
Jan
2025

FlowerStorm PaaS Platform Attacking Microsoft Users With Fake Login Pages

Rockstar2FA is a PaaS kit that mimics the legitimate credential-request behavior of cloud/SaaS platforms. Phishing campaigns are delivered via Telegram…