Cybersecurity researchers have discovered a malicious Python package on the Python Package Index (PyPI) repository that’s equipped to steal a victim’s Ethereum private keys by […]
Enabling Incognito Mode in RDP to Hide All the Traces
Microsoft’s Remote Desktop Protocol (RDP) has introduced a lesser-known but critical security feature colloquially referred to as “incognito mode” through its /public command-line parameter. This […]
FBI Warns of Threats Actors Mimic as BianLian Group to Attack Corporate Executives
The Federal Bureau of Investigation (FBI) has issued an urgent alert regarding a sophisticated email-based extortion campaign targeting corporate executives, wherein threat actors impersonate the […]
Apache Pinot Vulnerability Let Remote Attackers Bypass Authentication
A critical security vulnerability in Apache Pinot designated CVE-2024-56325, has been disclosed. It allows unauthenticated, remote attackers to bypass authentication mechanisms and gain unauthorized access […]
Microsoft 365 Announces E5 Security for Business Premium Customers as Add-on
Microsoft has announced the immediate availability of Microsoft 365 E5 Security as a cost-effective add-on for Business Premium subscribers, marking a strategic expansion of enterprise-grade […]
AMD Microcode Signature Verification Vulnerability Let Attackers Load Malicious Patches
Security researchers have uncovered a critical vulnerability in AMD Zen CPUs that allows attackers with elevated privileges to load malicious microcode patches, bypassing cryptographic signature […]
Safe{Wallet} Confirms North Korean TraderTraitor Hackers Stole $1.5 Billion in Bybit Heist
Safe{Wallet} has revealed that the cybersecurity incident that led to the Bybit $1.5 billion crypto heist is a “highly sophisticated, state-sponsored attack,” stating the North […]
What is risk management? Quantifying and mitigating uncertainty
What is risk management? Risk management is the process of identifying, analyzing, and mitigating uncertainties and threats that can harm your company or organization. No […]
Intel Maps New vPro Chips to MITRE’s ATT&CK Framework
The PC Security Stack Mappings project improves the security posture of corporate PCs by aligning each of the security features found in vPro PC and […]
PHP-CGI RCE Flaw Exploited in Attacks on Japan’s Tech, Telecom, and E-Commerce Sectors
Threat actors of unknown provenance have been attributed to a malicious campaign predominantly targeting organizations in Japan since January 2025. “The attacker has exploited the […]