DrayTek Devices Vulnerability Let Attackers Arbitrary Commands Remotely
01
Jan
2025

DrayTek Devices Vulnerability Let Attackers Arbitrary Commands Remotely

The DrayTek Gateway devices, more specifically the Vigor2960 and Vigor300B models, are susceptible to a critical command injection vulnerability.  Exploitable…

How To Navigate Certification Authority Distrust: Preventing Critical Incidents by Switching To A New Vendor
01
Jan
2025

How To Navigate Certification Authority Distrust: Preventing Critical Incidents by Switching To A New Vendor

In the ever-evolving landscape of digital security, maintaining trust is paramount. When a Certification Authority (CA) is no longer trusted…

Election Interference Using AI and Cyber Tactics
01
Jan
2025

Iranian and Russian Entities Sanctioned for Election Interference Using AI and Cyber Tactics

Jan 01, 2025Ravie LakshmananGenerative AI / Election Interference The U.S. Treasury Department’s Office of Foreign Assets Control (OFAC) on Tuesday…

Hey, Maybe It's Time to Delete Some Old Chat Histories
01
Jan
2025

Hey, Maybe It’s Time to Delete Some Old Chat Histories

If you’re worried about possible expansions of government surveillance and access to your information, or simply want to do some…

FortiGuard Labs Links EC2 Grouper Hackers to AWS Credential Exploits
01
Jan
2025

FortiGuard Labs Links New EC2 Grouper Hackers to AWS Credential Exploits

SUMMARY EC2 Grouper Identified: Researchers found EC2 Grouper exploiting AWS credentials and tools using distinct patterns like “ec2group12345.” Credential Compromise:…

DoubleClickjacking
01
Jan
2025

“Double-Click” Attack to Hack Websites & Take over Accounts

In a concerning development for internet security, a new variation of a long-standing cyberattack technique known as “DoubleClickjacking,” has been…

Naveen Goud
01
Jan
2025

Cybersecurity news headlines trending on Happy New Year 2025

Harley-Davidson Faces Data Breach, Customer Information Leaked Harley Davidson, the iconic American motorcycle manufacturer, has become the latest victim of…

Naveen Goud
01
Jan
2025

The Evolution of Ransomware: From the 1970s to 2024

Ransomware has evolved significantly since its inception in the 1970s, growing from simple, isolated incidents to a complex, global threat…

35 Google Chrome Extensions Hacked
01
Jan
2025

35 Google Chrome Extensions Hacked to Inject Malicious Code

A massive phishing campaign has compromised at least 35 Google Chrome extensions, collectively used by approximately 2.6 million users, injecting…

Rhode Island ’s data from health benefits system leaked on the dark web
31
Dec
2024

Rhode Island ’s data from health benefits system leaked on the dark web

Rhode Island ’s data from health benefits system leaked on the dark web Pierluigi Paganini December 31, 2024 Rhode Island…

Chrome
31
Dec
2024

New details reveal how hackers hijacked 35 Google Chrome extensions

New details have emerged about a phishing campaign targeting Chrome browser extension developers that led to the compromise of at…

The Biggest Global Data Breaches Of 2024: Lessons Learned
31
Dec
2024

The Biggest Global Data Breaches Of 2024: Lessons Learned

The previous year will mark one of the most destructive ones for global cybersecurity. Hackers targeted industries at all levels…