Category: Articles

Telecom Namibia Is Affected By Ransomware Targeting Inf...

When Telecom Namibia Declines To Engage In Negotiations, Hackers Post Private Information Online, Making The Southern Africa Telco...

Scientists Discover a Serious Security Vulnerability in...

Researchers studying cybersecurity have discovered firmware security flaws in the Illumina iSeq 100 DNA sequencing technology that...

Moxa Notifies Users of Serious Flaws in Secure and Cell...

Two security flaws that potentially permit privilege escalation and command execution have been identified by Taiwan-based Moxa as...

Windows Domain Controllers are rebooted and LSASS is br...

A proof-of-concept (PoC) attack for a security vulnerability in Windows Lightweight Directory Access Protocol (LDAP) that has been...

Cyberhaven Chrome Extension Breach Highlights Software ...

Cyberhaven's recent security incident reveals the growing risks in software supply chain security. A malicious attack on its Chrom...

Critical Security Flaws in ASUS Routers Enable Remote C...

ASUS has warned of critical vulnerabilities in several router models that allow remote command execution. Affecting firmware versi...

Any Microsoft server can crash due to an unpatched Acti...

Microsoft addressed two serious Active Directory Domain Controller vulnerabilities last month, one of which may be exploited to cr...

EC2 Grouper Hackers Exploit AWS Credentials for Cloud A...

The EC2 Grouper hacking group has been leveraging compromised AWS credentials and AWS tools to conduct sophisticated attacks on cl...

Trend Micro Resolves Critical Privilege Escalation Vuln...

Trend Micro has patched six high-severity vulnerabilities in its Apex One and Apex One as a Service products, which could allow lo...

Modernizing Security: Adopting New Frameworks in 2025

As we progress through 2025, organizations face unprecedented security challenges that require modern solutions. The convergence o...

Critical Command Injection Vulnerability in DrayTek Vig...

DrayTek's Vigor2960 and Vigor300B devices have a critical vulnerability that allows attackers to inject arbitrary commands via the...

Cybersecurity New Year's Resolutions: Establishing Appr...

As we begin 2025, organizations must recommit to security basics while adapting to new threats. Essential resolutions include impl...

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.