Researchers Hacked Car EV Chargers To Execute Arbitrary Code
11
Sep
2024

Researchers Hacked Car EV Chargers To Execute Arbitrary Code

Researchers discovered flaws in the Autel MaxiCharger EV charger that make it potential to execute arbitrary code on the device…

Innovator Spotlight: Keepnet Labs
11
Sep
2024

Innovator Spotlight: Keepnet Labs – Cyber Defense Magazine

Human error remains one of the most significant vulnerabilities in cybersecurity. Despite advances in technology and automated defenses, employees continue…

Naveen Goud
11
Sep
2024

Latest Cybersecurity News Headlines on Google

ICO and UK NCA Collaborate to Support Cyber Attack Victims The Information Commissioner’s Office (ICO) and the UK’s National Crime…

DragonRank Black Hat SEO Campaign
11
Sep
2024

DragonRank Black Hat SEO Campaign Targeting IIS Servers Across Asia and Europe

A “simplified Chinese-speaking actor” has been linked to a new campaign that has targeted multiple countries in Asia and Europe…

HMRC could lose millions in unpaid tax as non-compliant umbrella enters pre-pack administration
11
Sep
2024

HMRC could lose millions in unpaid tax as non-compliant umbrella enters pre-pack administration

The UK government is facing fresh calls to regulate umbrella companies, following the revelation that one non-compliant firm will avoid…

CosmicBeetle Exploiting Old Vulnerabilities To Attack SMBs All Over The World
11
Sep
2024

CosmicBeetle Exploiting Old Vulnerabilities To Attack SMBs All Over The World

Hackers target SMBs (Small and mid-sized businesses) primarily as they are often easier to compromise with due to weaker security…

Innovator Spotlight: Tanium
11
Sep
2024

Innovator Spotlight: Tanium – Cyber Defense Magazine

During my conversation with Melissa Bischoping, Senior Director of Security & Product Design Research at Tanium, she emphasized how the…

Threat Actors Exploiting Legitimate Software For Stealthy Cyber Attacks
11
Sep
2024

Threat Actors Exploiting Legitimate Software For Stealthy Cyber Attacks

CAMO, or Commercial Applications, Malicious Operations, highlights attackers’ increasing reliance on legitimate IT tools to bypass security defenses, which can…

Innovator Spotlight: Lineaje
11
Sep
2024

Innovator Spotlight: Lineaje – Cyber Defense Magazine

Attending Black Hat 2024 with Cyber Defense Magazine is always an enlightening experience, giving me the opportunity to interview several…

Jane Devry
11
Sep
2024

Five ways to lose your data

Innovation and the subsequent shift from on-premises applications and infrastructure has completely altered the role of IT across the business…

Arrest
11
Sep
2024

Chinese hackers linked to cybercrime syndicate arrested in Singapore

Six Chinese nationals and a Singaporean have been arrested on Monday in Singapore for their alleged role in malicious cyber activities committed…

New RansomHub Attack Killing Kaspersky’s TDSSKiller To Disable EDR
11
Sep
2024

New RansomHub Attack Killing Kaspersky’s TDSSKiller To Disable EDR

TDSSKiller is a free utility developed by Kaspersky Lab that is designed to detect and remove rootkits, a type of…