Beware Of New Phishing Attacks Stealing Microsoft Azure Cloud Logins
19
Dec
2024

New Phishing Attack Exploiting HubSpot Tools To Steal Microsoft Azure Logins

A sophisticated phishing campaign targeting European companies. The attack, which peaked in June 2024, aims to harvest Microsoft Azure cloud…

Next.js Vulnerability Let Attackers Bypass Authentication
19
Dec
2024

Next.js Vulnerability Let Attackers Bypass Authentication

A high-severity vulnerability has been discovered in the popular web framework, Next.js, which allows attackers to bypass authentication under specific…

Jane Devry
19
Dec
2024

Digital Trust Is Declining. Businesses Must Respond

Once a cornerstone of the digital promise, trust has been undermined by corporate misuse, data breaches, disinformation, and the growing…

Malware Disguised as Army+ App
19
Dec
2024

UAC-0125 Abuses Cloudflare Workers to Distribute Malware Disguised as Army+ App

Dec 19, 2024Ravie LakshmananDisinformation / Malware The Computer Emergency Response Team of Ukraine (CERT-UA) has disclosed that a threat actor…

Top 10 AI and storage stories of 2024
19
Dec
2024

Top 10 AI and storage stories of 2024

Artificial intelligence (AI) has hit the headlines and the datacentres, but with it comes a range of performance and operating…

Russia-linked UAC-0125 abuses Cloudflare Workers to target Ukrainian army
19
Dec
2024

Russia-linked UAC-0125 abuses Cloudflare Workers to target Ukrainian army

CERT-UA: Russia-linked UAC-0125 abuses Cloudflare Workers to target Ukrainian army Pierluigi Paganini December 19, 2024 The Computer Emergency Response Team…

The not-so-secret hack to impactful bug bounty programs 
19
Dec
2024

The not-so-secret hack to impactful bug bounty programs 

At the core of every thriving bug bounty platform lies its triage team. These teams evaluate vulnerability reports, deciding on…

Next.js Authorization Bypass Vulnerability Exposes Root-Level Pages
19
Dec
2024

Next.js Authorization Bypass Vulnerability Exposes Root-Level Pages

A critical security vulnerability tracked as CVE-2024-51479 has been identified in Next.js, a widely used React framework for building web…

This VPN Lets Anyone Use Your Internet Connection. What Could Go Wrong?
19
Dec
2024

This VPN Lets Anyone Use Your Internet Connection. What Could Go Wrong?

In other posts during the last year, according to the Kela analysis, cybercrime forum users have recommended Big Mama or…

CISA Proposes National Cyber Incident Response Plan
19
Dec
2024

CISA Proposes National Cyber Incident Response Plan

The Cybersecurity and Infrastructure Security Agency (CISA) has unveiled a proposed update to the National Cyber Incident Response Plan (NCIRP),…

Jane Devry
19
Dec
2024

What 2025 May Hold for Cybersecurity

Cybersecurity is dynamic, ever changing and unpredictable. This past year contained significant surprises. Who would have thought the largest data…

Netwrix 1Secure enhances protection against data and identity access risks
19
Dec
2024

Netwrix 1Secure enhances protection against data and identity access risks

Netwrix released a new version of its SaaS platform, Netwrix 1Secure. The latest version builds on its existing security monitoring…