AI Hangover
12
Aug
2024

The AI Hangover is Here – The End of the Beginning

After a good year of sustained exuberance, the hangover is finally here. It’s a gentle one (for now), as the…

Australia's Evolution Mining Cyberattack Disrupts Operations
12
Aug
2024

Australia’s Evolution Mining Cyberattack Disrupts Operations

Australian mining company Evolution Mining Limited has become the latest victim of a ransomware attack. The company, known for its…

Industrial Remote Access Gateway Tool hacked
12
Aug
2024

Researchers Hacked Industrial Remote Access Gateway Tool to Gain Root Access

Security researchers have uncovered severe vulnerabilities in the Ewon Cosy+, a widely used industrial remote access gateway tool, allowing them…

Solarman and Deye Solar Systems
12
Aug
2024

Researchers Uncover Vulnerabilities in Solarman and Deye Solar Systems

Aug 12, 2024Ravie LakshmananCritical Infrastructure / Vulnerability Cybersecurity researchers have identified a number of security shortcomings in photovoltaic system management…

Critical OpenSSH Vulnerability In FreeBSD Allows Remote Root Access
12
Aug
2024

Critical OpenSSH Vulnerability In FreeBSD Allows Remote Root Access

A newly discovered OpenSSH vulnerability in FreeBSD systems has been reported. This critical flaw, identified as CVE-2024-7589, could allow attackers…

Sumter County Sheriff’s Office Systems Hit by Rhysida Ransomware
12
Aug
2024

Sumter County Sheriff’s Office Systems Hit by Rhysida Ransomware

The Sumter County Sheriff’s Office has been victim to a ransomware attack orchestrated by the criminal group Rhysida. The cyberattack…

0.0.0.0 Day – 18 Yr Old Vulnerability Let Attackers Bypass All Browser Security
12
Aug
2024

NCSC to Build Nation-Scale Evidence Base for Cyber Deception

The UK’s National Cyber Security Centre (NCSC) recently hosted an unprecedented conference at its London headquarters, bringing together international government…

Unpatched MS Office flaw may leak NTLM hashes to attackers (CVE-2024-38200)
12
Aug
2024

Unpatched MS Office flaw may leak NTLM hashes to attackers (CVE-2024-38200)

A new MS Office zero-day vulnerability (CVE-2024-38200) can be exploited by attackers to grab users’ NTLM hashes, Microsoft has shared…

Gartner Highlights Cyble In 2024 Hype Cycle For Managed IT Services
12
Aug
2024

Gartner Highlights Cyble In 2024 Hype Cycle For Managed IT Services

Gartner highlights Cyble as a sample vendor in the Gartner® Hype Cycle™ for Managed IT Services, 2024, according to a…

Hackers’ Toolkit Exposed, Wide Range of Tools from Initial Access to Full Control
12
Aug
2024

Hackers’ Toolkit Exposed, Wide Range of Tools From Initial Access to Full Control

Cybersecurity researchers have discovered an extensive hacker toolkit, revealing a comprehensive set of tools designed for various stages of cyberattacks….

0.0.0.0 Day – 18 Yr Old Vulnerability Let Attackers Bypass All Browser Security
12
Aug
2024

Google’s Quick Share Vulnerabilities Let Attackers Execute Remote Code

By reverse-engineering Quick Share’s proprietary communication protocol, researchers uncovered multiple vulnerabilities, including unauthorized file writes, forced Wi-Fi connections, directory traversal,…

Resecurity unveils new AI-driven Fraud Prevention Platform
12
Aug
2024

Resecurity unveils new AI-driven Fraud Prevention Platform

Resecurity unveiled its advanced AI-driven Fraud Prevention Platform. This versatile solution is engineered to combat fraud across banking, virtual asset…