Kubernetes Image Builder Vulnerability: CVE-2024-9486 Risk
18
Oct
2024

Kubernetes Image Builder Vulnerability: CVE-2024-9486 Risk

A new security risk has emerged in the Kubernetes Image Builder, posing a critical threat to organizations that utilize this…

Cisco ATA 190 Telephone Adapter Vulnerabilities Let Attackers Execute Remote Code
18
Oct
2024

Cisco ATA 190 Telephone Adapter Vulnerabilities Let Attackers Execute Remote Code

Cisco has disclosed multiple vulnerabilities affecting its ATA 190 Series Analog Telephone Adapter firmware, posing significant user risks. These vulnerabilities…

Naveen Goud
18
Oct
2024

Beware of Starbucks Phishing Scam and China using Quantum tech to break encryption

Starbucks Coffee Lovers Box Phishing Scam Alert Starbucks is making headlines due to a phishing scam targeting its customers with…

BCHP cyberattack
18
Oct
2024

BCHP Cyberattack Compromises Sensitive Patient Data

Boston Children’s Health Physicians (BCHP), a multi-specialty healthcare group providing pediatric care across Connecticut and New York, recently notified patients…

New infosec products of the week: October 18, 2024
18
Oct
2024

New infosec products of the week: October 18, 2024

Here’s a look at the most interesting products from the past week, featuring releases from ExtraHop, GitGuardian, Nametag, Okta, Rubrik,…

PoC Exploit BIG-IP Privilege Escalation
18
Oct
2024

PoC Exploit Released for BIG-IP Privilege Escalation Vulnerability

A critical vulnerability in F5 BIG-IP, a popular network traffic management and security solution tracked as CVE-2024-45844, allows authenticated attackers…

Despite massive security spending, 44% of CISOs fail to detect breaches
18
Oct
2024

Despite massive security spending, 44% of CISOs fail to detect breaches

Despite global information security spending projected to reach $215 billion in 2024, 44% of CISOs surveyed reported they were unable…

Jane Devry
18
Oct
2024

As Attackers Embrace AI, Every Organization Should Do These 5 Things

AI benefits our society at large in numerous ways, but cybercriminals are using this new technology for nefarious purposes. From…

What to do if your iPhone or Android smartphone gets stolen?
18
Oct
2024

What to do if your iPhone or Android smartphone gets stolen?

A lost, stolen, or compromised smartphone today means we are in serious trouble. Most people have everything related to their…

Jane Devry
18
Oct
2024

DDoS Attacks and the Upcoming US Presidential Election

A few weeks ago, Tesla CEO and X (formerly Twitter) owner Elon Musk hosted a friendly conversation on X with…

Cybercrime's constant rise is becoming everyone's problem
18
Oct
2024

Cybercrime’s constant rise is becoming everyone’s problem

Cybercrime in recent years shows no signs of slowing down, with phishing attacks surging and ransomware tactics becoming more advanced,…

Jane Devry
18
Oct
2024

Addressing Critical Gaps in Threat Intelligence Sharing

Almost all organisations agree information sharing and collaboration are crucial elements in the fight against cybercriminals. That’s a majority as…