News
-
"Chinese APT Targets Hong Kong in Supply Chain Attack"Researchers have discovered that an emerging China-backed Advanced Persistent Threat (APT) group dubbed Carderbee targeted Hong Kong organizations in a supply chain attack involving legitimate software to deploy the PlugX/Korplug backdoor. The Symantec…
-
"TP-Link Smart Bulbs Can Let Hackers Steal Your Wi-Fi Password"Researchers from Universita di Catania and the University of London have discovered four vulnerabilities in the TP-Link Tapo L530E smart bulb and the TP-Link Tapo app that could enable attackers to steal the Wi-Fi password of their target. The TP-Link…
-
"Spoofing an Apple Device and Tricking Users Into Sharing Sensitive Data"At the DEF CON hacker conference, white hat hackers demonstrated how to spoof an Apple device and deceive users into divulging sensitive information. Conference attendees who use iPhones saw pop-up messages prompting them to connect their Apple ID or…
-
"Software Must Be Secure by Design, and Artificial Intelligence Is No Exception"In discussions about Artificial Intelligence (AI), the functioning of an AI system is often shrouded in mystery. However, the truth is much simpler as AI is a software system. According to the Cybersecurity and Infrastructure Security Agency's (CISA)…
-
"Thousands of Illicit Cyber Networks Disrupted in Africa Operation"INTERPOL and AFRIPOL coordinated an operation across 25 African countries that led to the arrest of 14 suspected cybercriminals and the identification of 20,674 suspicious cyber networks, underscoring the rise of digital insecurity and cyber threats in…
-
"CISA Conducts Largest Annual Election Security Drills Amid Threats Targeting Voting Systems"The Cybersecurity and Infrastructure Security Agency (CISA) recently led the largest annual election security exercise in the US, collaborating with the Justice Department, the FBI, and other federal participants to strengthen voting systems in the US.…
-
"FBI, Air Force Warn of Cyberattacks on Space Industry by 'Foreign Intelligence Operations'"According to US intelligence agencies, unnamed Foreign Intelligence Entities (FIEs) are escalating cyberattacks against US-based space companies. The FBI, the National Counterintelligence and Security Center (NCSC), and the Air Force Office of Special…
-
"Ivanti Ships Urgent Patch for API Authentication Bypass Vulnerability"Ivanti’s problems with security defects in its enterprise-facing products are starting to pile up. The IT software company recently shipped urgent patches for a critical-severity vulnerability in the Ivanti Sentry (formerly MobileIron Sentry)…
-
"Unveiling the Risks of Routing Protocols"Routing protocols are essential to the functioning of the Internet and the services that rely on them. However, many of these protocols were created without security in mind. Initially, the Border Gateway Protocol (BGP) did not account for the…
-
"Post-Quantum Cryptography: CISA, NIST, and NSA Recommend How to Prepare Now"The National Security Agency (NSA), Cybersecurity and Infrastructure Security Agency (CISA), and National Institute of Standards and Technology (NIST) issued a warning that cyber actors could target the US' most sensitive information now and use future…
-
"Japanese Watchmaker Seiko Breached by BlackCat Ransomware Gang"The BlackCat/ALPHV ransomware group has added Seiko to its leak website, claiming responsibility for a cyberattack disclosed by the Japanese company. Seiko is one of the largest and oldest watchmakers in the world, with around 12,000 employees and an…
-
"New WinRAR Vulnerability Could Allow Hackers to Take Control of Your PC"A high-severity security vulnerability has been found in the WinRAR utility, which a threat actor could exploit for Remote Code Execution (RCE) on Windows systems. The vulnerability, tracked as CVE-2023-40477 with a CVSS score of 7.8, stems from improper…