Critical ICS Vulnerabilities In Schneider Electric, MySCADA, Automated Logic
29
Nov
2024

Critical ICS Vulnerabilities In Schneider Electric, MySCADA, Automated Logic

A recent Cyble ICS vulnerabilities report sheds light on several critical vulnerabilities in industrial control systems (ICS) from major vendors…

ElizaRAT Leveraging Google, Telegram, and Slack Services For C2 Communication
29
Nov
2024

ElizaRAT Leveraging Google, Telegram, and Slack Services For C2 Communication

A sophisticated Windows Remote Access Trojan (RAT) called ElizaRAT has been developed by the APT36 (also known as Transparent Tribe)…

600,000+ Sensitive Records Exposed From Background Checks Service Provider
29
Nov
2024

600,000+ Sensitive Records Exposed From Background Checks Service Provider

A publicly exposed database has left the sensitive information of hundreds of thousands of individuals vulnerable to potential misuse. Not…

Cyble
29
Nov
2024

Cyble, Infratech Forge Alliance To Innovate Cybersecurity

Riyadh, Saudi Arabia, November 29, 2024 – Cyble, among the world’s fastest-growing AI-powered cybersecurity companies, is proud to announce a…

Best Free EDR Tools for Windows PC
29
Nov
2024

Best Free EDR Tools for Windows PC

Endpoint detection and response (EDR) tools offer businesses that employ hybrid work models or remote employees an extra layer of…

AI, Cloud, and ERP Security Flaws
29
Nov
2024

Microsoft Fixes AI, Cloud, and ERP Security Flaws; One Exploited in Active Attacks

Nov 29, 2024Ravie LakshmananAI Security / Cloud Security Microsoft has addressed four security flaws impacting its artificial intelligence (AI), cloud,…

Hackers Can Access Laptop Webcams Without Activating LED Indicator
29
Nov
2024

Hackers Can Access Laptop Webcams Without Activating LED Indicator

A critical vulnerability affecting laptop webcams, specifically on ThinkPad X230 models has been recently discovered as demonstrated by the Andrey…

The US Army's Vision of Soldiers in Exoskeletons Lives On
29
Nov
2024

The US Army’s Vision of Soldiers in Exoskeletons Lives On

This newfound push appears to have yielded several fresh experiments with exoskeleton technology in recent years. In 2018, Lockheed Martin…

Phishing-as-a-Service
29
Nov
2024

Phishing-as-a-Service “Rockstar 2FA” Targets Microsoft 365 Users with AiTM Attacks

Nov 29, 2024Ravie LakshmananCybercrime / Cloud Security Cybersecurity researchers are warning about malicious email campaigns leveraging a phishing-as-a-service (PhaaS) toolkit…

Giving a Voice to Future Generations of Female Cybersecurity Leaders
29
Nov
2024

Giving a Voice to Future Generations of Female Cybersecurity Leaders

While most organizations today remain aware of the ongoing cybersecurity threats, there is a constant struggle to keep pace with…

Jane Devry
29
Nov
2024

COOs Will Make Impact-Based Security a Mainstream Requirement

Cyber risk management accounts for the probability of attacks on operational technology (OT) at large industrial facilities, including all the…

Zyxel Firewalls vulnerability
29
Nov
2024

Zyxel Firewalls Exploited In Helldown Ransomware Attacks

Zyxel Firewalls have become a key target in recent cyberattacks, with attackers exploiting a critical vulnerability to deploy the dangerous…