MongoDB Vulnerability Allows Attackers to Gain Complete Control of Windows Systems
09
Aug
2024

MongoDB Flaw Allows Attackers to Gain Complete Control of Windows Systems

A critical vulnerability, identified as CVE-2024-7553, has been discovered in MongoDB. It could potentially allow attackers to take complete control…

Jane Devry
09
Aug
2024

The Olympic Games have been protected from cyber-attacks so far

The expectation of cyberattacks targeting the Olympic Games was widespread. Earlier this year, Mandiant released a report identifying likely attackers…

Shorter TLS certificate lifespans expected to complicate management efforts
09
Aug
2024

Shorter TLS certificate lifespans expected to complicate management efforts

76% of security leaders recognize the pressing need to move to shorter certificate lifespans to improve security, according to Venafi….

Cisco smart Install vulnerability
09
Aug
2024

Hackers Exploit Cisco Smart Install Vulnerability: CISA Warns

In a recent advisory, the Cybersecurity and Infrastructure Security Agency (CISA) has highlighted growing concerns regarding the exploitation of vulnerabilities…

Tor
09
Aug
2024

How to access the Dark Web using the Tor Browser

The dark web refers to websites that are not on the regular internet but are instead hidden in a private…

Apache HTTP Server
09
Aug
2024

Confusion Attacks in Apache HTTP Server Let Attackers Gain Root Access Remotely

A recent research presentation at Black Hat USA 2024 revealed architectural vulnerabilities within the Apache HTTP Server, a widely used…

NIS2: A catalyst for cybersecurity innovation or just another box-ticking exercise?
09
Aug
2024

NIS2: A catalyst for cybersecurity innovation or just another box-ticking exercise?

The Network and Information Security (NIS) 2 Directive is possibly one of the most significant pieces of cybersecurity regulation to…

Malware-as-a-Service and Ransomware-as-a-Service lower barriers for cybercriminals
09
Aug
2024

Malware-as-a-Service and Ransomware-as-a-Service lower barriers for cybercriminals

The sophistication of cyber threats has escalated dramatically, with malicious actors’ deploying advanced tactics, techniques, and procedures (TTPs) to exploit…

Where internal audit teams are spending most of their time
09
Aug
2024

Where internal audit teams are spending most of their time

Over half of key stakeholders including audit committees, company boards, and chief financial officers are looking to internal audit teams…

MadLicense 0-click RCE Flaw
09
Aug
2024

PoC Released for 0-click RCE Flaw Impacting Windows Server

PoC exploit released for critical 0-click remote code execution (RCE) vulnerability affecting Windows Server. This flaw impacts Windows Server versions…

New infosec products of the week: August 9, 2024
09
Aug
2024

New infosec products of the week: August 9, 2024

Here’s a look at the most interesting products from the past week, featuring releases from: Rapid7, AppOmni, Contrast Security, Elastic,…

Tor
09
Aug
2024

How to connect to the Dark Web using the Tor Browser

The dark web refers to websites that are not on the regular internet but are instead hidden in a private…