Security researchers have uncovered multiple critical vulnerabilities in Appsmith, a popular open-source developer platform for building internal applications. Most concerning is CVE-2024-55963, which allows unauthenticated […]
New IOCONTROL Malware Attacking Critical Infrastructure to Gain Remote Access and Control
A newly identified malware strain dubbed “IOCONTROL” has emerged as a critical threat to operational technology (OT) and Internet of Things (IoT) systems, particularly targeting […]
Public-Private Ops Net Big Wins Against African Cybercrime
Three cybersecurity firms worked with Interpol and authorities in Nigeria, South Africa, Rwanda, and four other African nations to arrest more than 300 cybercriminals. The […]
New Security Flaws Found in VMware Tools and CrushFTP — High Risk, No Workaround
Broadcom has issued security patches to address a high-severity security flaw in VMware Tools for Windows that could lead to an authentication bypass. Tracked as […]
Zero-Day Alert: Google Releases Chrome Patch for Exploit Used in Russian Espionage Attacks
Google has released out-of-band fixes to address a high-severity security flaw in its Chrome browser for Windows that it said has been exploited in the […]
South African Poultry Company Reports $1M Loss After Cyber Intrusion
The company reports that no sensitive information was breached or stolen in the cyber intrusion and that its operations are running normally again. The original […]
OPSEC Nightmare: Leaking US Military Plans to a Reporter
Experts say the leakage of US military plans to a reporter this month reflects a severe operational security failure on the part of US leadership. […]
Accused Snowflake Attacker ‘Judische’ Agrees to US Extradition
Though there is no confirmation as to when this extradition will occur, Alexander Moucka agreed to be transferred in writing before a judge. The original […]
5 Considerations for a Data Loss Prevention Rollout
Strong DLP can be a game-changer — but it can also become a slow-moving, overcomplicated mess if not executed properly. The original article found on […]
Meet the Low-Key Access Broker Supercharging Russian State Cybercrime
Raspberry Robin breaks into organizations and sells access to Russian threat actors, including the military cyber unit behind attempted coups, assassinations, and influence operations throughout […]