Malware Found in Healthcare Patient Monitors Linked to Chinese IP Address
31
Jan
2025

Malware Found in Healthcare Patient Monitors Linked to Chinese IP Address

A critical cybersecurity vulnerability has been uncovered in Contec CMS8000 patient monitors, revealing embedded malware that poses significant risks to…

D-Link Routers Vulnerability Let Attackers Gain Full Router Control Remotely
31
Jan
2025

D-Link Routers Vulnerability Let Attackers Gain Full Router Control Remotely

A critical unauthenticated Remote Code Execution (RCE) vulnerability has been affecting DSL-3788 routers, allowing attackers to acquire complete control over…

Microsoft to Boost M365 Bounty Program With New Products & Rewards Up to $27,000
31
Jan
2025

Microsoft to Boost M365 Bounty Program With New Products & Rewards Up to $27,000

A significant extension of Microsoft’s Microsoft 365 (M365) Bounty Program has been announced. The program now includes new Viva products…

Jane Devry
31
Jan
2025

Is data minimization the new data ethics in subscription management?

Data could be your biggest asset but it could also be your weakest link. The more you collect, the more…

31
Jan
2025

Infosec products of the month: January 2025

Here’s a look at the most interesting products from the past month, featuring releases from: Absolute Security, Atsign, authID, BackBox,…

Authorities Take Down Cracked & Nulled Hacking Forums Used by 10 Million Users
31
Jan
2025

Authorities Take Down Cracked & Nulled Hacking Forums Used by 10 Million Users

In a law enforcement operation dubbed “Operation Talent,” an international coalition of law enforcement agencies led by Germany’s Bundeskriminalamt (BKA)…

Jane Devry
31
Jan
2025

5 cybersecurity practices for custom software development

Whether you are going to build a custom CRM system, custom ERP tool, or any other bespoke solution, you need…

31
Jan
2025

Nine out of ten emails are spam

Now, more than ever, users can fall prey to word-perfect AI-created phishing campaigns, subtle BEC messages that sound remarkably like…

Windows Vulnerability in COM Objects Let Attackers Trigger Remote Command Execution
31
Jan
2025

Windows Vulnerability in COM Objects Let Attackers Trigger Remote Command Execution

James Forshaw of Google Project Zero has shed light on a significant security vulnerability in Windows related to accessing trapped…

Massive Hacking Forum Network Dismantled by Authorities, Impacting 10M Users
31
Jan
2025

Massive Hacking Forum Network Dismantled by Authorities, Impacting 10M Users

Authorities have delivered a major blow to the cybercrime world by dismantling two of the largest hacking forums globally—Cracked.io and…

31
Jan
2025

Platformization is key to reduce cybersecurity complexity

Organizations are facing security complexity challenges as they juggle an average of 83 different security solutions from 29 vendors, according…

VMware Aria Flaws
31
Jan
2025

Broadcom Patches VMware Aria Flaws – Exploits May Lead to Credential Theft

Jan 31, 2025Ravie LakshmananVulnerability / Data Security Broadcom has released security updates to patch five security flaws impacting VMware Aria…