Hackers Exploiting Roundcube XSS Vulnerability To Steal Login Credentials
21
Oct
2024

Hackers Exploiting Roundcube XSS Vulnerability To Steal Login Credentials

Security researchers have uncovered a new phishing campaign targeting users of the popular open-source Roundcube webmail software. Unknown threat actors…

Hackers Use Bumblebee Malware to Gain Access to Corporate Networks
21
Oct
2024

Hackers Use Bumblebee Malware to Gain Access to Corporate Networks

A sophisticated malware loader known as Bumblebee has resurfaced, posing a significant threat to corporate networks worldwide. Cybersecurity researchers at…

Synology takes aim at enterprise customers and flash storage
21
Oct
2024

Synology takes aim at enterprise customers and flash storage

Synology is best known as a network-attached storage (NAS) provider in the small and medium-sized enterprise (SME) and even consumer…

US Government Says Relying on Chinese Lithium Batteries Is Too Risky
21
Oct
2024

US Government Says Relying on Chinese Lithium Batteries Is Too Risky

Analysts at the US Department of Homeland Security shared an internal report to local agencies in August, warning them about…

FBI Arrested Hacker Behind the Takeover of the U.S. SEC X account
21
Oct
2024

FBI Arrested Hacker Behind the Takeover of the U.S. SEC X account

The Federal Bureau of Investigation (FBI) has apprehended Eric Council Jr., a 25-year-old resident of Athens, Alabama, for his alleged…

The complete guide for in-scope entities
21
Oct
2024

The complete guide for in-scope entities

NIS2 will take effect across the EU from 18th October 2024, meaning time is running out to comply with its…

How a Trump Win Could Unleash Dangerous AI
21
Oct
2024

How a Trump Win Could Unleash Dangerous AI

The reporting requirements are essential for alerting the government to potentially dangerous new capabilities in increasingly powerful AI models, says…

21
Oct
2024

The Internet Archive breach continues

Cybersecurity troubles are not over for the Internet Archive (IA), the nonprofit organization behind the popular digital library site: after…

Review of late evidence doesn’t change Post Office Capture system report
21
Oct
2024

Review of late evidence doesn’t change Post Office Capture system report

A review of late evidence submitted to investigators reviewing the Post Office’s pre-Horizon Capture system has resulted in no significant…

8 essential tools for performing effective reconnaissance
21
Oct
2024

8 essential tools for performing effective reconnaissance

We all know that reconnaissance is important in bug bounty, in fact, it is the most important phase in bug…

12 incident response metrics your business should be tracking
21
Oct
2024

12 incident response metrics your business should be tracking

If there’s a vulnerability in your systems that cybercriminals could exploit, you’ll want to know about it. Collaborating with people…

Hackers Mimic As  ESET To Attack Organizations With Wiper Malware
21
Oct
2024

Hackers Mimic As  ESET To Attack Organizations With Wiper Malware

Hackers impersonated ESET, a prominent cybersecurity firm, to attack organizations with destructive wiper malware. The attack, which began on October…