Researchers Found North Korean Hackers Advanced Tactics, techniques, and procedures

Recent research has highlighted the increasingly sophisticated tactics, techniques, and procedures (TTPs) employed by North Korean state-sponsored hackers. These cyber actors have demonstrated a strategic focus on espionage, financial theft, and disruption, targeting a broad range of sectors globally. Their…

SAP-Patchday: 18 neue Schwachstellen korrigiert

SAP veröffentlicht zum Februar-Patchday 18 Sicherheitsmitteilungen, die Sicherheitslücken behandeln, die teils als hohes Risiko eingestuft werden. Dieser Artikel wurde indexiert von heise Security Lesen Sie den originalen Artikel: SAP-Patchday: 18 neue Schwachstellen korrigiert

Critical Flaw in Progress LoadMaster Allows Attackers to Execute System Commands

 A series of critical security vulnerabilities have been identified in Progress Software’s LoadMaster application, potentially allowing remote attackers to execute system commands or access sensitive files. CVE-2024-56131, CVE-2024-56132, CVE-2024-56133, CVE-2024-56134, and CVE-2024-56135, affect all current versions of LoadMaster, including Multi-Tenant LoadMaster (MT) deployments, prompting an…

Review: Inside Cyber Warfare, 3rd Edition

Inside Cyber Warfare, 3rd Edition by Jeffrey Caruso explores how nation-states, corporations, and hackers engage in digital warfare. It offers insights into the intersection of cybersecurity, geopolitics, and emerging technology. About the author Jeffrey Caruso is a globally recognized cybersecurity…