CVE Prioritizer: Open-source tool to prioritize vulnerability patching
19
Feb
2024

CVE Prioritizer: Open-source tool to prioritize vulnerability patching

CVE Prioritizer is an open-source tool designed to assist in prioritizing the patching of vulnerabilities. It integrates data from CVSS,…

week in security
19
Feb
2024

A week in security (February 12 – February 18)

February 16, 2024 – A group of cybercriminals is committing bank fraud by convincing victims to scan their IDs and…

Alleged RBI Data Breach Claims Emerge On Dark Web
19
Feb
2024

Alleged RBI Data Breach Claims Emerge On Dark Web

The Reserve Bank of India has allegedly been targeted in a cyberattack, linked to threat actor ZALCYBER. Although the RBI…

Comisiones Obreras data breach
19
Feb
2024

Comisiones Obreras Data Breach: Sensitive Info Leaked Online

A database containing 21,988 complete credentials, encompassing login details and passwords, allegedly tied to Comisiones Obreras (CC. OO.), has been…

Telstra trials way to keep eftpos, critical voice services working during outages
19
Feb
2024

Telstra trials way to keep eftpos, critical voice services working during outages – Cloud – Telco/ISP

Telstra is trialling a way to keep critical services like eftpos and Services Australia numbers working in the event of…

SolarWinds fixed three critical RCE flaws in its Access Rights Manager product
19
Feb
2024

SolarWinds addressed critical RCEs in Access Rights Manager

SolarWinds addressed critical RCEs in Access Rights Manager (ARM) Pierluigi Paganini February 19, 2024 SolarWinds addressed three critical vulnerabilities in…

The Danger Lurking Just Below Ukraine's Surface
19
Feb
2024

The Danger Lurking Just Below Ukraine’s Surface

Oleksandr Kryvtsov had enough. The owner of an agricultural company in Hrakove, near Kharkiv, Kryvtsov found his land littered with…

Outlook 0-day RCE Flaw
19
Feb
2024

First Ever iOS Trojan Steals Facial Recognition Data

A novel, very sophisticated mobile Trojan dubbed GoldPickaxe.iOS that targets iOS users exclusively was discovered to collect facial recognition data, intercept…

North Korea raked $3 billion from Ransomware and US offers $10m for Hive
19
Feb
2024

How to defend against credential stuffing attacks

Protecting against credential stuffing attacks requires a multi-layered approach to security. Here are some effective strategies to defend against such…

Balancing "super app" ambitions with privacy
19
Feb
2024

Balancing “super app” ambitions with privacy

When Elon Musk’s ambitions to transform X into an “everything app” were divulged last year, he joined several companies known…

Roundcube Flaws
19
Feb
2024

Russian-Linked Hackers Breach 80+ Organizations via Roundcube Flaws

Feb 19, 2024NewsroomCyber Espionage / Vulnerability Threat actors operating with interests aligned to Belarus and Russia have been linked to…

Cyberattack On ETISALAT Claimed By LockBit Ransomware
19
Feb
2024

Cyberattack On ETISALAT Claimed By LockBit Ransomware

ETISALAT, the state-owned Emirates Telecommunications Group Company PJSC in the UAE, is reportedly grappling with a ransomware assault attributed to…