The energy sector is the cornerstone of modern infrastructure, powering essential services and supporting the daily operations of economies worldwide. However, it also faces unique cybersecurity challenges, particularly in complying with the North American Electric Reliability Corporation’s Critical Infrastructure Protection…
Category: EN
NASA’s Cybersecurity Initiative: What Spacecraft Manufacturers Need to Know
NASA is about to introduce new requirements for its contractors. These requirements will dramatically improve the cybersecurity of spacecraft and the US’ resilience to cyber threats. But what do these requirements mean for spacecraft manufacturers? What challenges will they face?…
Medusa Ransomware: What You Need To Know
What is the Medusa ransomware? Medusa is a ransomware-as-a-service (RaaS) platform that first came to prominence in 2023. The ransomware impacts organisations running Windows, predominantly exploiting vulnerable and unpatched systems and hijacking accounts through initial access brokers. Initial access brokers?…
HPE investigating security breach after hacker claims theft of sensitive data
A well-known hacker claims to have stolen source code and user data from the enterprise IT giant © 2024 TechCrunch. All rights reserved. For personal use only. This article has been indexed from Security News | TechCrunch Read the original…
Russian Ransomware Groups Deploy Email Bombing and Teams Vishing
Sophos has warned of IT impersonation vishing attacks designed to remotely deploy ransomware This article has been indexed from www.infosecurity-magazine.com Read the original article: Russian Ransomware Groups Deploy Email Bombing and Teams Vishing
Apache CXF Vulnerability Triggers DoS Attack
Colm O hEigeartaigh announced a critical vulnerability affecting various versions of Apache CXF, a widely-used framework for building web services. This issue, documented as CVE-2025-23184, poses a significant risk as it can lead to a Denial of Service (DoS) attack…
October 2024 Cyber Attacks Statistics
After the cyber attacks timelines, it’s time to publish the statistics for October 2024 where I collected and analyzed 240 events… This article has been indexed from HACKMAGEDDON Read the original article: October 2024 Cyber Attacks Statistics
The Future of Automotive Cybersecurity: Why Learning Car Hacking is Essential
As vehicles become smarter, the stakes for securing them grow higher. Learning car hacking is no longer a niche skill — it’s a necessity for anyone interested in the future of cybersecurity. The post The Future of Automotive Cybersecurity: Why…
HackGATE: Setting New Standards for Visibility and Control in Penetration Testing Projects
Imagine receiving a penetration test report that leaves you with more questions than answers. Questions like, “Were all functionalities of the web app tested?” or ” Were there any security issues that could have been identified during testing?” often go…
Microsoft Rolls Out New Administrator Protection Feature Under Windows Security
Microsoft has announced the release of Windows 11 Insider Preview Build 27774 to the Canary Channel. This build comes packed with enhancements, including a significant new feature aimed at bolstering system security—Administrator Protection. The highlight of this update is the…
Cyber Hygiene: Strengthening Your Digital Immune System Through Routine Maintenance
Good cyber hygiene isn’t a one-time effort; it’s an ongoing process that requires diligence, awareness and consistency. The post Cyber Hygiene: Strengthening Your Digital Immune System Through Routine Maintenance appeared first on Security Boulevard. This article has been indexed from…
New Contacto Ransomware Evades AV Detection & Uses Windows Console for Execution
In early January 2025, a new ransomware strain identified as Contacto surfaced, showcasing advanced techniques designed to bypass conventional security measures. This analysis provides insights into its operational mechanisms, particularly suited for professionals venturing into ransomware analysis. Operational Mechanisms Upon…
Experts found multiple flaws in Mercedes-Benz infotainment system
Kaspersky researchers shared details about multiple vulnerabilities impacting the Mercedes-Benz MBUX infotainment system. Kaspersky published research findings on the first-generation Mercedes-Benz User Experience (MBUX) infotainment system, specifically focusing on the Mercedes-Benz Head Unit. The researchers started from the results of…
Most European Privacy Teams Are Understaffed and Underfunded
ISACA research claims privacy budgets are set to decline further in 2025 This article has been indexed from www.infosecurity-magazine.com Read the original article: Most European Privacy Teams Are Understaffed and Underfunded
Breaking free from reactive security
Why not adopt a new approach for 2025? Webinar In today’s digital landscape, cybersecurity teams can often find themselves trapped in an endless cycle of responding to threats.… This article has been indexed from The Register – Security Read the…
HPE breach claims, CIA analyst guilty, Hotel data exposed
HPE investigates breach claims Former CIA analyst pleads guilty to sharing Top Secret files Data of nearly half million hotel guests exposed Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like…right…
OWASP Smart Contract Top 10 2025 Released – What’s new!
The Open Web Application Security Project (OWASP) has released its updated Smart Contract Top 10 for 2025, providing essential insights for developers and security teams in the rapidly evolving Web3 environment. This document outlines the most pressing vulnerabilities found in smart contracts,…
Ransomware Attack Forces UK Brit High School to Close Doors For Students
A ransomware attack has compelled UK Brit, a prominent British high school, to close its doors to students for two days, specifically Monday, January 20, and Tuesday, January 21, 2025. This decision follows an incident that occurred on Friday, January…
Feel Reassured with Robust Machine Identity Protocols
Why Are Machine Identity Protocols Crucial for Robust Security Measures? Imagine opening your virtual “front door,” only to find unknown software entities exploring your data terrain. Chilling, isn’t it? Well, that’s where Machine Identity Protocols step in. They act as…
Getting Better: Advances in Secrets Rotation Tech
Why is Secrets Rotation Technology Crucial in the Data Security Landscape? The safety of sensitive information matters more than ever. With the proliferation of Non-Human Identities (NHIs) and a marked increase in cyber threats, the management of these identities is…