Category: EN

CISA Warns of Adobe & Windows Kernel Driver Exploited in Attacks

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical alert, adding two significant vulnerabilities to its Known Exploited Vulnerabilities Catalog. These vulnerabilities, actively exploited by malicious actors, underscore the growing risks facing organizations. Adobe ColdFusion Access Control Weakness…

Kali Linux 2024.4 Released – What’s New!

Kali Linux has unveiled its final release for 2024, version Kali Linux 2024.4, packed with notable updates, including new tools and enhancements. This highly anticipated update caters to the needs of security professionals, ethical hackers, and tech enthusiasts with a…

Nine Updated Security Measures for the Modern Smart Home

Modern smart homes offer unparalleled convenience, but there’s a catch. Security vulnerabilities can leave you open to cyberattacks, letting criminals “see” far more than they could glimpse through your window curtains—like your bank account number. Taking the following nine measures…

The shifting security landscape: 2025 predictions and challenges

As the borderless threat ecosystem poses new challenges for companies and governments worldwide, CISA’s 2025-2026 International Plan aims to address this problem. CISA’s plan calls for integrated cyber defense across borders, addressing the complex, global cybersecurity challenges that businesses, governments…

9 Updated Security Measures for the Modern Smart Home

Modern smart homes offer unparalleled convenience, but there’s a catch. Security vulnerabilities can leave you open to cyberattacks, letting criminals “see” far more than they could glimpse through your window curtains—like your bank account number. Taking the following nine measures…

Cybersecurity jobs available right now: December 17, 2024

CISO ONE Security | Israel | Hybrid – View job details As a CISO, you will be responsible for overseeing information security, cybersecurity, application security, and business continuity strategies. The role involves implementing and managing security measures and collaborating with…

Link Trap: GenAI Prompt Injection Attack

Prompt injection exploits vulnerabilities in generative AI to manipulate its behavior, even without extensive permissions. This attack can expose sensitive data, making awareness and preventive measures essential. Learn how it works and how to stay protected. This article has been…