Critical FortiWLM Flaw
19
Dec
2024

Fortinet Warns of Critical FortiWLM Flaw That Could Lead to Admin Access Exploits

Dec 19, 2024Ravie LakshmananVulnerability / Network Security Fortinet has issued an advisory for a now-patched critical security flaw impacting Wireless…

French court refuses to expedite trial of Sky ECC cryptophone distributor Thomas Herdman
19
Dec
2024

French court refuses to expedite trial of Sky ECC cryptophone distributor Thomas Herdman

Five judges will hear a case against 30 people accused of being involved in the distribution of encrypted mobile phones…

A New Cyber Attack Trend In 2024
19
Dec
2024

A New Cyber Attack Trend In 2024

In recent years, cyber attackers have continuously upgraded their tactics, exploiting a variety of tools and techniques to evade detection…

Beware Of New Phishing Attacks Stealing Microsoft Azure Cloud Logins
19
Dec
2024

New Phishing Attack Exploiting HubSpot Tools To Steal Microsoft Azure Logins

A sophisticated phishing campaign targeting European companies. The attack, which peaked in June 2024, aims to harvest Microsoft Azure cloud…

Next.js Vulnerability Let Attackers Bypass Authentication
19
Dec
2024

Next.js Vulnerability Let Attackers Bypass Authentication

A high-severity vulnerability has been discovered in the popular web framework, Next.js, which allows attackers to bypass authentication under specific…

Jane Devry
19
Dec
2024

Digital Trust Is Declining. Businesses Must Respond

Once a cornerstone of the digital promise, trust has been undermined by corporate misuse, data breaches, disinformation, and the growing…

Malware Disguised as Army+ App
19
Dec
2024

UAC-0125 Abuses Cloudflare Workers to Distribute Malware Disguised as Army+ App

Dec 19, 2024Ravie LakshmananDisinformation / Malware The Computer Emergency Response Team of Ukraine (CERT-UA) has disclosed that a threat actor…

Top 10 AI and storage stories of 2024
19
Dec
2024

Top 10 AI and storage stories of 2024

Artificial intelligence (AI) has hit the headlines and the datacentres, but with it comes a range of performance and operating…

Russia-linked UAC-0125 abuses Cloudflare Workers to target Ukrainian army
19
Dec
2024

Russia-linked UAC-0125 abuses Cloudflare Workers to target Ukrainian army

CERT-UA: Russia-linked UAC-0125 abuses Cloudflare Workers to target Ukrainian army Pierluigi Paganini December 19, 2024 The Computer Emergency Response Team…

The not-so-secret hack to impactful bug bounty programs 
19
Dec
2024

The not-so-secret hack to impactful bug bounty programs 

At the core of every thriving bug bounty platform lies its triage team. These teams evaluate vulnerability reports, deciding on…

Next.js Authorization Bypass Vulnerability Exposes Root-Level Pages
19
Dec
2024

Next.js Authorization Bypass Vulnerability Exposes Root-Level Pages

A critical security vulnerability tracked as CVE-2024-51479 has been identified in Next.js, a widely used React framework for building web…

This VPN Lets Anyone Use Your Internet Connection. What Could Go Wrong?
19
Dec
2024

This VPN Lets Anyone Use Your Internet Connection. What Could Go Wrong?

In other posts during the last year, according to the Kela analysis, cybercrime forum users have recommended Big Mama or…