Category: EN

The latest from Black Hat USA 2025

<p>Black Hat USA 2025 is returning for its 28th year, covering the latest in infosec for technical experts, thought leaders, innovative vendors and cybersecurity pros.</p> <div class=”ad-wrapper ad-embedded”> <div id=”halfpage” class=”ad ad-hp”> <script>GPT.display(‘halfpage’)</script> </div> <div id=”mu-1″ class=”ad ad-mu”> <script>GPT.display(‘mu-1’)</script> </div>…

What is the Mitre ATT&CK framework?

<p>The Mitre ATT&amp;CK framework is a free, globally accessible <a href=”https://www.techtarget.com/whatis/definition/knowledge-base”>knowledge base</a> that describes the latest behaviors and tactics of cyberadversaries to help organizations strengthen their <a href=”https://www.techtarget.com/searchsecurity/definition/cybersecurity”>cybersecurity</a> strategies. The acronym <i>ATT&amp;CK</i> stands for Adversarial Tactics, Techniques and Common Knowledge.…

What is COMSEC (communications security)?

<p>Communications security (COMSEC) is the prevention of unauthorized access to <a href=”https://www.techtarget.com/searchnetworking/definition/telecommunications-telecom”>telecommunications</a> traffic or to any written information that is transmitted or transferred. There are several COMSEC disciplines, including the following:</p> <div class=”ad-wrapper ad-embedded”> <div id=”halfpage” class=”ad ad-hp”> <script>GPT.display(‘halfpage’)</script> </div>…

Packet Power EMX and EG

View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.3 ATTENTION: Exploitable remotely/low attack complexity Vendor: Packet Power Equipment: EMX, EG Vulnerability: Missing Authentication for Critical Function 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to gain full…

Hackers Deploy Lookalike PyPI Platform to Lure Python Developers

The Python Package Index (PyPI) website is being used to launch sophisticated phishing campaigns targeting Python developers, highlighting the ongoing threats that open-source ecosystems face. The phishing campaign is utilising a counterfeit version of the website to target Python developers. …

Delta Electronics DIAView

View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.3 ATTENTION: Exploitable remotely/low attack complexity Vendor: Delta Electronics Equipment: DIAView Vulnerability: Improper Limitation of a Pathname to a Restricted Directory 2. RISK EVALUATION Successful exploitation of this vulnerability may allow a remote…

Johnson Controls FX80 and FX90

View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.4 ATTENTION: Exploitable remotely/low attack complexity Vendor: Johnson Controls Inc. Equipment: FX80 and FX90 Vulnerability: Dependency on Vulnerable Third-Party Component 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to…

February 2025 Cyber Attacks Statistics

After the cyber attacks timelines, it’s time to publish the statistics for February 2025 where I collected and analyzed 231 events. In February 2025, Cyber Crime continued to lead the Motivations chart with 64% down from 75%, of February. Operations…