Cisco announces a partnership with the OECD to study well-being in the digital age. Our joint initiative will examine the complex nature of digital transformation, its role as both a catalyst for progress and a source of potential risk to…
Category: EN
Experts warn of a vulnerability affecting Bosch BCC100 Thermostat
Researchers warn of high-severity vulnerability affecting Bosch BCC100 thermostats. Researchers from Bitdefender discovered a high-severity vulnerability affecting Bosch BCC100 thermostats. The researchers discovered a vulnerability, tracked as CVE-2023-49722 (CVSS score: 8.3), that can be exploited by an attacker on the…
Ransomware attacks witnessed 55% surge in 2023
The conclusion of the year 2023 witnessed an alarming 55% surge in ransomware attacks, as reported by Cyberint, a company specializing in threat intelligence services. In comparison to the preceding year’s 2034 victims, ransomware gangs targeted approximately 4356 victims in…
Critical Apache OFBiz Zero-day AuthBiz (CVE-2023-49070 and CVE-2023-51467)
Cybersecurity researchers recently uncovered a critical flaw in the widely used Apache OFBiz Enterprise Resource Planning (ERP) system, CVE-2023-51467. The zero-day vulnerability CVE-2023-51467 poses a significant threat, boasting a CVSS. The post Critical Apache OFBiz Zero-day AuthBiz (CVE-2023-49070 and CVE-2023-51467)…
10 cybersecurity frameworks you need to know about
As cyber threats grow more sophisticated, understanding and implementing robust cybersecurity frameworks is crucial for organizations of all sizes. This article lists the most essential cybersecurity frameworks developed to guide businesses and governments in safeguarding their digital assets. From the…
3 ways to combat rising OAuth SaaS attacks
OAuth attacks are on the rise. In December, the Microsoft Threat Intelligence team observed threat actors misusing OAuth apps to take over a cloud server and mine cryptocurrency, establish persistence following business email compromise and launch spam activity using the…
Tsurugi Linux: Tailoring user experience for digital forensics and OSINT investigations
Tsurugi Linux is a heavily customized open-source distribution focused on supporting DFIR investigations. The project focuses mainly on live forensics analysis, post-mortem analysis, and digital evidence acquisition. Users can also perform malware analysis, OSINT and computer vision activities. “We’ve crafted…
Geopolitical tensions combined with technology will drive new security risks
Misinformation and disinformation are biggest short-term risks, while extreme weather and critical change to Earth systems are greatest long-term concern, according to the Global Risks 2024 Report from the World Economic Forum. Against a backdrop of systemic shifts in global…
China’s gambling crackdown spawned wave of illegal online casinos and crypto-crime in Asia
‘Inaccessible and autonomous armed group territories’ host crooks who use tech to launder cash, run slave scam gangs, and more Global crime networks have set up shop in autonomous territories run by armed gangs across Southeast Asia, and are using…
Ontario city the latest to temporarily lose control of its X account
As in several other recent attacks after taking over and re-naming the account the hacker posted links to cryptocurr This article has been indexed from IT World Canada Read the original article: Ontario city the latest to temporarily lose control…
Warren (Ohio) PD Launches Mark43 Records Management System
Mark43, a leading cloud-native public safety software company that took home Top Awards for Best Disaster Preparedness and Disaster Recovery Solution in the 2023 ‘ASTORS’ Homeland Security Awards Program, is pleased to announce the official deployment of its Records Management…
The Cyber Risk Nightmare and Financial Risk Disaster of Using Personal Messaging Apps in The Workplace
By Anurag Lal, President and CEO of NetSfere Using personal messaging apps for business communication and collaboration is harmless – right? Wrong. This practice, which is unfortunately still widespread in […] The post The Cyber Risk Nightmare and Financial Risk…
Over 178,000 SonicWall next-generation firewalls (NGFW) online exposed to hack
Researchers from Bishop Fox found over 178,000 SonicWall next-generation firewalls (NGFW) publicly exploitable. SonicWall next-generation firewall (NGFW) series 6 and 7 devices are affected by two unauthenticated denial-of-service vulnerabilities, tracked as CVE-2022-22274 and CVE-2023-0656, that could potentially lead to remote code execution.…
Anonymous Sudan Claims London Internet Exchange Attack Over Yemen Strikes
By Deeba Ahmed Anonymous Sudan is a pro-Russia hacktivist group, and their emergence aligns with the rise of other pro-Russian cyber actors since the beginning of the Ukraine war. This is a post from HackRead.com Read the original post: Anonymous…
More Than 100 Deepfake Ads Featuring British Prime Minister Spread On Facebook
The post More Than 100 Deepfake Ads Featuring British Prime Minister Spread On Facebook appeared first on Facecrooks. Facebook scammers are constantly seeking new ways to fool users, and deepfake videos are at the very cutting edge. But in addition…
Thousands of Juniper Networks devices vulnerable to critical RCE bug
Yet more support for the argument to adopt memory-safe languages More than 11,500 Juniper Networks devices are exposed to a new remote code execution (RCE) vulnerability, and infosec researchers are pressing admins to urgently apply the patches.… This article has…
IT World Canada strikes partnership with Canadian Cybersecurity Network
Goal is to make it easier for infosec pros to access each organization This article has been indexed from IT World Canada Read the original article: IT World Canada strikes partnership with Canadian Cybersecurity Network
Windows Defender SmartScreen Vulnerability Exploited with Phemedrone Stealer
By Deeba Ahmed Attackers Leveraging Windows Vulnerability in Phemedrone Malware Campaign for Enhanced Stealth. This is a post from HackRead.com Read the original post: Windows Defender SmartScreen Vulnerability Exploited with Phemedrone Stealer This article has been indexed from Hackread –…
Revolutionizing Commerce With AI: Trends and Predictions
Picture a future where commerce is not just an exchange of goods and services but an intricate relationship of data, insights, and artificial intelligence (AI). This is the new reality for product leaders in the digital age, where AI is…
Spot Technologies, now with $2M, will see AI security tech go into Mexico Walmarts
Spot’s flagship product, VisionX, taps into deep learning and computer vision technologies to analyze consumer and theft behaviors. © 2023 TechCrunch. All rights reserved. For personal use only. This article has been indexed from Security News | TechCrunch Read the…