Tag: EN

Data Is the New Diamond: Heists in the Digital Age

Unit 42 explores the similarities between the social engineering and reconnaissance tactics used by financially motivated criminals. The post Data Is the New Diamond: Heists in the Digital Age appeared first on Unit 42. This article has been indexed from…

Multiple Hikvision Vulnerabilities Let Attackers Inject Executable Commands

Hikvision has disclosed three significant security vulnerabilities affecting multiple versions of its HikCentral product suite that could enable attackers to execute malicious commands and gain unauthorized administrative access.  The vulnerabilities, assigned CVE identifiers CVE-2025-39245, CVE-2025-39246, and CVE-2025-39247, were reported to…

DPRK IT Workers Using Code-Sharing Platforms to Secure New Remote Jobs

Over the past year, security researchers have observed a growing trend of North Korean–linked developers establishing credible-looking profiles on popular code-sharing platforms such as GitHub, CodeSandbox, and Gist. These accounts frequently host legitimate open-source projects alongside hidden payloads, allowing operators…

Reduce Fraud Risk with Effective Identity Verification

In a world where transactions occur smoothly across borders and platforms, the need for robust fraud and risk management strategies has become critical. As technology advances, so do the tactics used by… The post Reduce Fraud Risk with Effective Identity Verification appeared…

TransUnion Data Breach Impacts 4.4 Million

The credit reporting firm did not name the third-party application involved in the incident, only noting that it was used for its US consumer support operations. The post TransUnion Data Breach Impacts 4.4 Million appeared first on SecurityWeek. This article…

Critical Hikvision Vulnerabilities Allow Remote Command Injection

On August 28, 2025, the Hikvision Security Response Center (HSRC) issued Security Advisory SN No. HSRC-202508-01, detailing three critical vulnerabilities affecting various HikCentral products. Collectively assigned CVE identifiers CVE-2025-39245, CVE-2025-39246, and CVE-2025-39247, these vulnerabilities range in severity from moderate to…