Category: EN

Researchers Hacked Into Commercial Trucks & Buses To Unlock Remotely

Cybersecurity experts have recently demonstrated how heavy-duty vehicles such as commercial trucks and buses can be remotely compromised, potentially giving attackers control over critical vehicle functions. These findings highlight significant vulnerabilities in the increasingly software-driven and interconnected nature of modern…

Adobe Acrobat Vulnerabilities Enable Remote Code Execution

A recent disclosure by Cisco Talos’ Vulnerability Discovery & Research team highlighted several vulnerability issues in Adobe Acrobat. All of these vulnerabilities have been addressed by their respective vendors, aligning with Cisco’s third-party vulnerability disclosure policy. For detection of these…

EFF Joins 7amleh Campaign to #ReconnectGaza

< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> < div class=”field__item even”> In times of conflict, the internet becomes more than just a tool—it is a lifeline, connecting those caught in chaos with the outside world. It carries voices…

Hackers Exploiting TP-Link Vulnerability to Gain Root Access

Researchers have uncovered a critical vulnerability in TP-Link TL-WR845N routers that could allow attackers to gain complete control over affected devices.  The flaw, identified as CVE-2024-57040 and assigned a CVSS score of 9.8 (Critical), exposes hardcoded root shell credentials stored…

Pay, fight, or stall? The dilemma of ransomware negotiations

Ransomware negotiations are a high-stakes game where every decision matters. In this Help Net Security video, Kurtis Minder, CEO at GroupSense, takes us inside the world of ransomware negotiations. We learn how attackers communicate, the tough decisions victims face, and…

Social Media and Email hacking surged in 2024

In 2024, a significant surge in hacking activities targeting social media and email accounts was reported, according to Action Fraud. The increase in cyber-crime complaints compared to the previous year, 2023, was staggering, with reports soaring from 23,000 cases in…

Technical Tips to Evade AI-Based Cyber Threats

As artificial intelligence (AI) continues to evolve, so do the tactics employed by cybercriminals. AI-based cyber threats have become increasingly sophisticated, utilizing advanced algorithms to carry out targeted attacks, bypass traditional security measures, and exploit vulnerabilities in systems. To stay…

Review: Cybersecurity Tabletop Exercises

Packed with real-world case studies and practical examples, Cybersecurity Tabletop Exercises offers insights into how organizations have successfully leveraged tabletop exercises to identify security gaps and enhance their incident response strategies. The authors explore a range of realistic scenarios, including…