Weekly Cyber Security News Recap
15
Dec
2024

Data Breach, Vulnerabilities & Cyber Attack & Other News

Welcome to this week’s Cyber Security Newsletter, where we delve into the latest developments and crucial updates in cybersecurity. Your…

Beyond Encryption: Advancing Data-in-Use Protection
15
Dec
2024

Beyond Encryption: Advancing Data-in-Use Protection

In the ever-evolving landscape of cryptography, traditional encryption methods safeguarding data at rest and in transit remain foundational to cybersecurity…

Curl Vulnerability Attackers Sensitive Information
15
Dec
2024

Curl Vulnerability Let Attackers Access Sensitive Information

A critical security flaw has been discovered in the popular data transfer tool Curl, potentially allowing attackers to access sensitive…

The Simple Math Behind Public Key Cryptography
15
Dec
2024

The Simple Math Behind Public Key Cryptography

The original version of this story appeared in Quanta Magazine. For thousands of years, if you wanted to send a…

Jane Devry
15
Dec
2024

Securing Against Shopping Scams: Cybersecurity Risks to Avoid During the Holidays

The holiday season is largely characterized by a significant rise in consumer spending, and digital deals for Black Friday and…

IOCONTROL cyberweapon used to target infrastructure in the US and Isreael
15
Dec
2024

IOCONTROL cyberweapon used to target infrastructure in the US and Isreael

IOCONTROL cyberweapon used to target infrastructure in the US and Isreael Pierluigi Paganini December 14, 2024 Iran-linked threat actors target…

Russian cyberspies target Android users with new spyware
14
Dec
2024

Russian cyberspies target Android users with new spyware

Russian cyberspies Gamaredon has been discovered using two Android spyware families named ‘BoneSpy’ and ‘PlainGnome’ to spy on and steal…

Hacker
14
Dec
2024

390,000 WordPress accounts stolen from hackers in supply chain attack

A threat actor tracked as MUT-1244 has stolen over 390,000 WordPress credentials in a large-scale, year-long campaign targeting other threat…

U.S. CISA adds Cleo Harmony, VLTrader, and LexiCom flaw to its Known Exploited Vulnerabilities catalog
14
Dec
2024

U.S. CISA adds Cleo Harmony, VLTrader, and LexiCom flaw to its Known Exploited Vulnerabilities catalog

U.S. CISA adds Cleo Harmony, VLTrader, and LexiCom flaw to its Known Exploited Vulnerabilities catalog Pierluigi Paganini December 14, 2024 U.S….

A complete guide to finding advanced file upload vulnerabilities
14
Dec
2024

A complete guide to finding advanced file upload vulnerabilities

File upload vulnerabilities are fun to find, they are impactful by nature and in some cases even result in remote…

Benefits of Network Monitoring Systems
14
Dec
2024

Benefits of Network Monitoring Systems

Maintaining a resilient, secure, and efficient network infrastructure is more important than ever. Network monitoring systems, which encompass both hardware…

BADBOX Malware
14
Dec
2024

Germany Disrupts BADBOX Malware on 30,000 Devices Using Sinkhole Action

Dec 14, 2024Ravie LakshmananBotnet / Ad Fraud Germany’s Federal Office of Information Security (BSI) has announced that it has disrupted…