Critical Acronis Cyber Infrastructure vulnerability exploited in the wild (CVE-2023-45249)
29
Jul
2024

Critical Acronis Cyber Infrastructure vulnerability exploited in the wild (CVE-2023-45249)

CVE-2023-45249, a critical vulnerability affecting older versions of Acronis Cyber Infrastructure, is being exploited by attackers. About Acronis Cyber Infrastructure…

Frost Radar Recognizes Cyble As A Top Performer In CTI
29
Jul
2024

Frost Radar Recognizes Cyble As A Top Performer In CTI

Atlanta, GA – July 26, 2024 – Cyble, a leading cyber threat intelligence 2024 provider, has been named the Leader…

Operation ShadowCat Using Weaponized Office document To Attack Users In India
29
Jul
2024

Operation ShadowCat Using Weaponized Office document To Attack Users In India

Researchers identified a new attack campaign (“Operation ShadowCat”) using malicious LNK files distributed via spam emails, which triggers a PowerShell…

How Infostealers Pillaged the World’s Passwords
29
Jul
2024

How Infostealers Pillaged the World’s Passwords

These platforms take cues in how they are designed and marketed from legitimate information and ecommerce services. Many markets and…

Cisco Patches the Products Impacted by RADIUS Protocol Vulnerability
29
Jul
2024

Cisco Patches the Products Impacted by RADIUS Protocol Vulnerability

Cisco has issued patches for multiple products affected by a critical vulnerability in the RADIUS protocol. The vulnerability, identified as…

The Other Lesson from the XZ Utils Supply-Chain Attack
29
Jul
2024

The Other Lesson from the XZ Utils Supply-Chain Attack

“The best supply chain attack execution ever seen” might sound like yet another hyperbole designed to attract attention, except in…

Data Security Game
29
Jul
2024

How Searchable Encryption Changes the Data Security Game

Searchable Encryption has long been a mystery. An oxymoron. An unattainable dream of cybersecurity professionals everywhere. Organizations know they must…

Telecommuncations CISO
29
Jul
2024

Threat Intelligence In Telecommunication: CISO’s Lifeline

The telecommunications industry stands at the crossroads of innovation and vulnerability. As one of the backbone industries of digital economies,…

Threat Actors Using OS Command Injection Vulnerabilities To Compromise Systems
29
Jul
2024

Threat Actors Using OS Command Injection Vulnerabilities To Compromise Systems

By exploiting OS command injection vulnerabilities, threat actors can run arbitrary commands on a host operating system to obtain unauthorized…

RaspAP Flaw-Hackers Escalate Privileage with Raspberry Pi Devices
29
Jul
2024

RaspAP Flaw-Hackers Escalate Privileage with Raspberry Pi Devices

A critical local privilege escalation vulnerability has been discovered in RaspAP, an open-source project designed to transform Raspberry Pi devices…

UK government invests £106m in five quantum tech hubs
29
Jul
2024

UK government invests £106m in five quantum tech hubs

The government is ploughing millions of pounds into five new quantum hubs in Glasgow, Edinburgh, Birmingham, Oxford and London to…

North Korean Onyx Sleet Using Group Of Malware And Exploits to Gain Intelligence
29
Jul
2024

North Korean Onyx Sleet Using Group Of Malware And Exploits to Gain Intelligence

Onyx Sleet, a cyber espionage group also known as SILENT CHOLLIMA, Andariel, DarkSeoul, Stonefly, and TDrop2, mainly targets the military,…