Illegal Crypto Mining: How Businesses Can Prevent Themselves From Being ‘Cryptojacked’
18
Nov
2024

Illegal Crypto Mining: How Businesses Can Prevent Themselves From Being ‘Cryptojacked’

The popularity of cryptocurrencies like Ethereum and Bitcoin surged during the pandemic era. What began as a niche, almost novelty…

Final report on Nats calls for improvements to contingency process
18
Nov
2024

Final report on Nats calls for improvements to contingency process

The major incident caused by the failure of the UK’s National Air Traffic Services (Nats) in August 2023 may be…

Hackers on Black Friday 
18
Nov
2024

NCSC Warns Of Fraud Risks As Black Friday Approaches

As Black Friday approaches, shoppers eagerly anticipate major discounts and deals, hoping to snag a bargain. However, the surge in…

How our new engine framework helped address the critical CUPS vulnerability within the day
18
Nov
2024

How our new engine framework helped address the critical CUPS vulnerability within the day

When a critical vulnerability in the printing system CUPS started raising alarms among security teams, Detectify had already entered war-room…

18
Nov
2024

Apache HertzBeat Vulnerability Let Attackers Exfiltrate Sensitive Data

A recently discovered vulnerability in Apache HertzBeat, an open-source real-time monitoring tool, has raised concerns about potential data exfiltration. The…

ChatGPT Sandbox Vulnerabilities Allow Python Script Execution, File Manipulation
18
Nov
2024

Mozilla 0Din Warns of ChatGPT Sandbox Flaws Enabling Python Execution

Mozilla’s 0Din uncovers critical flaws in ChatGPT’s sandbox, allowing Python code execution and access to internal configurations. OpenAI has addressed…

18
Nov
2024

Fake Discount Sites Exploit Black Friday to Hijack Shopper Information

A new phishing campaign is targeting e-commerce shoppers in Europe and the United States with bogus pages that mimic legitimate…

T-Mobile is one of the victims of the massive Chinese breach of telco firms
18
Nov
2024

T-Mobile is one of the victims of the massive Chinese breach of telco firms

T-Mobile is one of the victims of the massive Chinese breach of telecom firms Pierluigi Paganini November 18, 2024 T-Mobile…

Zohocorp ManageEngine ADAudit Plus Vulnerable To SQL Injection Attacks
18
Nov
2024

Zohocorp ManageEngine ADAudit Plus Vulnerable To SQL Injection Attacks

Zohocorp’s ManageEngine has disclosed a critical vulnerability in its ADAudit Plus software during a significant cybersecurity development. It’s a popular…

Naveen Goud
18
Nov
2024

The Critical Role of a CEO in Bolstering Corporate Cybersecurity

In today’s digital age, where cyber threats are growing more sophisticated by the day, the role of a CEO in…

Citrix Virtual Apps & Desktops Vulnerability Actively Exploited in Attacks
18
Nov
2024

Citrix Virtual Apps & Desktops Vulnerability Actively Exploited in Attacks

A recently discovered vulnerability in Citrix Virtual Apps and Desktops is being actively exploited in the wild. The flaw, which…

Naveen Goud
18
Nov
2024

T Mobile Hacked and info such as call records and police request data breached

T-Mobile, one of the leading telecommunications providers in the United States, has officially acknowledged that its systems were breached by…