Switzerland Vows Peace Talks Despite Disruption
11
Jun
2024

Switzerland Vows Peace Talks Despite Disruption

Switzerland has seen a notable increase in cyberattacks and disinformation campaigns as it prepares to host a crucial summit aimed…

AGL to transform consumer business with $150m Kaluza stake
11
Jun
2024

AGL to transform consumer business with $150m Kaluza stake – Software

AGL Energy is set to overhaul its consumer business operations through a 20 percent stake in electricity supply and billing…

Expert released PoC exploit code for CVE-2024-29849
11
Jun
2024

Expert released PoC exploit code for CVE-2024-29849

Expert released PoC exploit code for CVE-2024-29849. Patch it now! Pierluigi Paganini June 11, 2024 A proof-of-concept (PoC) exploit code…

Critical Vulnerabilities In Netgear Routers Let Attackers Bypass Authentication
11
Jun
2024

Critical Vulnerabilities In Netgear Routers Let Attackers Bypass Authentication

Security analysis identified multiple vulnerabilities in the Netgear WNR614 JNR1010V2 N300 router (firmware V1.1.0.54_1.0.1) that could allow attackers to bypass…

Hackers Weaponizing MSC Files In Targeted Attack Campaign
11
Jun
2024

Hackers Weaponizing MSC Files In Targeted Attack Campaign

Hackers utilize MSC or Microsoft Management Console files in themed attack campaigns as these files contain commands and scripts that…

Drilling into data to help the UK’s energy transition
11
Jun
2024

Drilling into data to help the UK’s energy transition

Thank you for joining! Access your Pro+ Content below. 11 June 2024 Drilling into data to help the UK’s energy…

Central Securities Corporation cyberattack
11
Jun
2024

Underground Team’s Central Securities Corporation Cyberattack

The Underground Team ransomware group has allegedly claimed a cyberattack on Central Securities Corporation, asserting access to a staggering 42.8…

Hackers Using OTP bots To Bypass Two-Factor Authentication
11
Jun
2024

Hackers Using OTP bots To Bypass Two-Factor Authentication

Two-factor authentication (2FA) is a security method that requires two verification steps for user access and is commonly implemented with…

Arm Warns Of Mali GPU Kernel Driver Flaws Exploited In The Wild
11
Jun
2024

Arm Warns Of Mali GPU Kernel Driver Flaws Exploited In The Wild

The Mali GPU driver is a widely used Graphical Processing Unit for multiple devices, including Android and Linux. A new…

Arm Mali GPU Drivers
11
Jun
2024

Arm Warns of Actively Exploited Zero-Day Vulnerability in Mali GPU Drivers

Jun 11, 2024NewsroomMobile Security / Technology Arm is warning of a security vulnerability impacting Mali GPU Kernel Driver that it…

Japan Video-Sharing Website Suspensed Services Following Cyber Attack
11
Jun
2024

Japan Video-Sharing Website Suspensed Services by Cyber Attack

The popular Japanese video-sharing website Niconico has suspended its services due to a large-scale cyberattack. Niconico is one of Japan’s…

Snowflake
11
Jun
2024

Snowflake Breach Exposes 165 Customers’ Data in Ongoing Extortion Campaign

Jun 11, 2024NewsroomData Theft / Cloud Security As many as 165 customers of Snowflake are said to have had their…