Russian state-sponsored threat actor COLDRIVER, long known for targeting high-profile NGOs, policy advisors, and dissidents, has been linked to a rapidly evolving malware campaign following […]
CISA Warns of Actively Exploited Windows SMB Vulnerability
The Cybersecurity and Infrastructure Security Agency (CISA) has added a critical Microsoft Windows Server Message Block (SMB) vulnerability to its Known Exploited Vulnerabilities catalog, warning […]
Pakistani Cyber Actors Impersonating ‘NIC eEmail Services’ to Target Indian Government
Pakistan-based advanced persistent threat group APT36, also known as TransparentTribe, is actively targeting Indian government entities with a sophisticated spear-phishing campaign using email lures themed […]
Microsoft Windows Cloud Minifilter Flaw Enables Privilege Escalation
A critical security vulnerability in Microsoft Windows Cloud Minifilter has been patched, addressing a race condition that allowed attackers to escalate privileges and create files […]
Over 71,000 WatchGuard Devices Exposed to Remote Code Execution Attacks
The cybersecurity community has raised a serious alarm following the recent daily reporting of vulnerable WatchGuard devices impacted by a major security flaw. According to […]
US NSA alleged to have launched a cyber attack on a Chinese agency
China’s claim that the US National Security Agency (NSA) was behind a cyber attack against the country’s timekeeping centre could be true, says an expert. […]
New Microchip Tech Protects Vehicles from Laser Attacks
“FD-SOI” makes hardware attacks on silicon chips more difficult. And, researchers argue, it’ll help OEMs with regulatory compliance. ​The original article found on darkreading Read […]
Flawed Vendor Guidance Exposes Enterprises to Avoidable Risk
Oracle E-Business Suite customers received conflicting deployment guidance, leaving enterprises exposed a recent zero-day flaw, Andrew argues. ​The original article found on darkreading Read More
Is Your Car a BYOD Risk? Researchers Demonstrate How
If an employee’s phone connects to their car and then their corporate network, an attack against the car can reach the company. ​The original article […]
International Sting Takes Down SIM Box Criminal Network
The operation took down a massive SIM card fraud network that provided fake phone numbers from more than 80 countries to criminals. ​The original article […]