Category: EN

HPE fixed multiple flaws in its StoreOnce software

Hewlett Packard Enterprise (HPE) addressed multiple flaws in its StoreOnce data backup and deduplication solution. HPE has released security patches for eight vulnerabilities in its StoreOnce backup solution. These issues could allow remote code execution, authentication bypass, data leaks, and…

Longstanding NATO Partnership Strengthens Our Collective Cyber Defenses

Learn about how public-private partnerships and related activities provide critical platforms for organizations across all industries and regions to share intelligence and refine response strategies against sophisticated threats.        This article has been indexed from Fortinet Industry Trends Blog Read…

New Linux PumaBot Attacking IoT Devices by Brute-Forcing SSH Credentials

Cybersecurity researchers have identified a sophisticated new threat targeting the expanding Internet of Things ecosystem. PumaBot, a Go-based Linux botnet, has emerged as a significant concern for organizations operating vulnerable IoT devices, particularly surveillance systems. Unlike conventional malware that conducts…

Hackers Weaponize Ruby Gems To Exfiltrate Telegram Tokens and Messages

A sophisticated supply chain attack has emerged targeting the RubyGems ecosystem, exploiting geopolitical tensions surrounding Vietnam’s recent Telegram ban to steal sensitive developer credentials and communications. The malicious campaign involves two typosquatted Ruby gems designed to impersonate legitimate Fastlane plugins,…

Going Into the Deep End: Social Engineering and the AI Flood

AI is transforming the cybersecurity landscape—empowering attackers with powerful new tools while offering defenders a chance to fight back. But without stronger awareness and strategy, organizations risk falling behind. The post Going Into the Deep End: Social Engineering and the…