Bosch Thermostats and Smart Nutrunners
15
Jan
2024

High-Severity Flaws Uncovered in Bosch Thermostats and Smart Nutrunners

Jan 15, 2024NewsroomOperational Technology / Network Security Multiple security vulnerabilities have been disclosed in Bosch BCC100 thermostats and Rexroth NXA015S-36V-B…

2024 McDonald's Data Breach
15
Jan
2024

Alleged 2024 McDonald’s Data Breach Surfaces On Dark Web

In a developing story that underscores the persistent challenges of cybersecurity in the corporate world, an alleged new McDonald’s data…

How To Combat the Mounting ‘Hacktivist’ Threat
15
Jan
2024

How To Combat the Mounting ‘Hacktivist’ Threat

By Manish Gohil, Senior Associate, Dragonfly The war in Ukraine has seen the emergence of highly-disruptive cyber criminals, motivated less…

How to smartly tackle BlackCat Ransomware group
15
Jan
2024

Medusa Ransomware Unleashes New Tactics: Data Sale, Time Extension, and AI Threats

In the ever-evolving landscape of cyber threats, Medusa Ransomware has taken a bold step by launching a dedicated blog to…

Tura Scandinavia AB Cyberattack
15
Jan
2024

Tura Scandinavia AB Cyberattack Claimed By LockBit Ransomware

Tura Scandinavia AB allegedly finds itself targeted by the LockBit ransomware group, marking another episode in the company’s history of…

OT Cybersecurity: Safeguarding Building Operations in a Digitized World
15
Jan
2024

OT Cybersecurity: Safeguarding Building Operations in a Digitized World

By Mirel Sehic, Global Director of Cyber Security, Honeywell In an increasingly digitized world, the looming threat of cyberattacks has…

A Comprehensive Guide to Penetration Testing in Public Clouds
15
Jan
2024

A Comprehensive Guide to Penetration Testing in Public Clouds

As organizations increasingly migrate their operations to public cloud environments, the need for robust security measures has never been more…

Flipping the BEC funnel: Phishing in the age of GenAI
15
Jan
2024

Flipping the BEC funnel: Phishing in the age of GenAI

For years, phishing was just a numbers game: A malicious actor would slap together an extremely generic (and usually poorly-written)…

DDoS Attack
15
Jan
2024

DDoS Attacks on the Environmental Services Industry Surge by 61,839% in 2023

Jan 15, 2024NewsroomServer Security / Cyber Attack The environmental services industry witnessed an “unprecedented surge” in HTTP-based distributed denial-of-service (DDoS)…

cyberattack on Lithuania websites
15
Jan
2024

NoName Launches Cyberattack On Lithuania Websites

Several prominent organizations in Lithuania, including Compensa Vienna Insurance Group, If Insurance, Lithuanian Roads Association, AD REM, INIT, and Balticum,…

Adalanche: Open-source Active Directory ACL visualizer, explorer
15
Jan
2024

Adalanche: Open-source Active Directory ACL visualizer, explorer

Adalanche provides immediate insights into the permissions of users and groups within an Active Directory. It’s an effective open-source tool…

Researchers demo bug-chaining of Juniper Networks vulnerabilities
15
Jan
2024

Juniper patches multiple router bugs – Security

Juniper Networks has issued its first three security updates for 2024, including a critical bug in its J-Web network management…