How Kettering University protects us all
If you’ve driven a car, used cloud services or even turned on a smart faucet, you’ve likely benefited from the cybersecurity expertise of someone in…
If you’ve driven a car, used cloud services or even turned on a smart faucet, you’ve likely benefited from the cybersecurity expertise of someone in…
A recent and significant cybersecurity threat has emerged involving a critical vulnerability in Apache Tomcat, identified as CVE-2025-24813. This vulnerability allows for remote code execution,…
Cybersecurity experts have uncovered how hackers use Cascading Style Sheets (CSS) to deceive spam filters and monitor user behavior. This sophisticated technique allows malicious actors…
The Singapore Cyber Emergency Response Team (SingCERT) has issued a warning regarding the rise in fraudulent emails, with scammers impersonating officials from the Cyber Security…
A recent disclosure by Cisco Talos’ Vulnerability Discovery & Research team highlighted several vulnerability issues in Adobe Acrobat. All of these vulnerabilities have been addressed…
The Malaysia Computer Emergency Response Team (MyCERT) has reported several Drupal vulnerabilities within its AI module, specifically affecting versions prior to 1.0.5. This issue, outlined in…
In 2024, a significant surge in hacking activities targeting social media and email accounts was reported, according to Action Fraud. The increase in cyber-crime complaints…
As artificial intelligence (AI) continues to evolve, so do the tactics employed by cybercriminals. AI-based cyber threats have become increasingly sophisticated, utilizing advanced algorithms to…
Hackers exploit a vulnerability in TP-Link routers, specifically the TL-WR845N model, to gain full control over the system. This exploit allows unauthorized users to access…
Packed with real-world case studies and practical examples, Cybersecurity Tabletop Exercises offers insights into how organizations have successfully leveraged tabletop exercises to identify security gaps…
IntelMQ is an open-source solution designed to help IT security teams (including CERTs, CSIRTs, SOCs, and abuse departments) streamline the collection and processing of security…
The former chief technology officer of Microsoft Australia Lee Hickin is to lead the federal government’s “reshaped” National AI Centre. Lee Hickin, National AI Centre…