Hackers Mimic Road Toll Collection Services to Steal Your Money
22
Apr
2024

Hackers Mimic Road Toll Collection Services to Steal Your Money

The FBI’s Internet Crime Complaint Center (IC3) has warned about a sophisticated smishing scam targeting drivers across multiple states. Since…

Researchers Claim that Windows Defender Can Be Bypassed
22
Apr
2024

Researchers Claim that Windows Defender Can Be Bypassed

Cybersecurity experts from SafeBreach have revealed a series of vulnerabilities that could allow attackers to remotely delete files on a…

week in security
22
Apr
2024

A week in security (April 15 – April 21)

April 18, 2024 – A major international law enforcement effort has disrupted the notorious LabHost phishing-as-a-service platform. April 18, 2024…

Hackers Offering Admin Access to 3000 Fortinet SSl-VPN
22
Apr
2024

Hackers Offering Admin Access to 3000 Fortinet SSl-VPN

Hackers are now offering administrative access to over 3000 Fortinet SSL-VPN devices. This breach poses a significant threat to the…

FIN7 Attacking IT Employees
22
Apr
2024

Apple Removes WhatsApp & Threads from its App Store for China

With the tightening grip of Chinese regulatory measures on foreign digital services, Apple Inc. has removed several major messaging apps,…

Citrix UberAgent Vulnerability Allows Attackers To Escalate Privileges
22
Apr
2024

Citrix UberAgent Vulnerability Allows Privilege Escalation

Citrix’s uberAgent, a sophisticated monitoring tool used to enhance performance and security across Citrix platforms, has been identified as having…

EASA Alerts Airlines Amid Suspected Cyber-Attacks on UK-Bound Flights
22
Apr
2024

EASA Alerts Airlines Amid Suspected Cyber-Attacks on UK-Bound Flights

European Union Aviation Safety Agency (EASA) has issued a cautionary alert following reports of cyber-attacks targeting flights bound for the…

The first steps of establishing your cloud security strategy
22
Apr
2024

The first steps of establishing your cloud security strategy

In this article, we’ll identify some first steps you can take to establish your cloud security strategy. We’ll do so…

AI-Fueled Cyber Espionage
22
Apr
2024

North Korean Hackers Turn to AI-Fueled Cyber Espionage

Apr 22, 2024NewsroomCryptocurrency / Artificial Intelligence Microsoft has revealed that North Korea-linked state-sponsored cyber actors has begun to use artificial…

+17K WordPress websites infected with the Balada Injector
22
Apr
2024

A flaw in the Forminator plugin impacts hundreds of thousands of WordPress sites

A flaw in the Forminator plugin impacts hundreds of thousands of WordPress sites Pierluigi Paganini April 22, 2024 Japan’s CERT…

Detectify is now available on AWS Marketplace
22
Apr
2024

Detectify is now available on AWS Marketplace

We’re pleased to share that our External Attack Surface Management (EASM) solution is now available on AWS Marketplace through private…

North Koreans Secretly Animated Amazon and Max Shows, Researchers Say
22
Apr
2024

North Koreans Secretly Animated Amazon and Max Shows, Researchers Say

Some file names gave away clues about the series and episode numbers. There were also files and projects the researchers…