This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.
Category: Articles
Aquabot Botnet Exploiting Mitel Phone Vulnerability to ...
A newly observed Mirai-based botnet variant, known as Aquabot, has been actively exploiting a command injection flaw in Mitel SIP ...
Three Russian Nationals Are Sanctioned By The EU For Cy...
Three People Have Been Sanctioned By The European Union Council For Allegedly Engaging in " Malicious Cyber Activities" Against Es...
Critical Zero-Day Vulnerability in Zyxel CPE Devices Un...
Cybersecurity experts are raising alarms about a critical zero-day vulnerability affecting Zyxel CPE Series devices, which is curr...
Researchers Uncover Account Takeover Flaw in Popular Tr...
Cybersecurity researchers have revealed details of a recently patched account takeover vulnerability that affected a widely used o...
Fortinet Urges Immediate Action to Address Critical Aut...
Fortinet has confirmed the active exploitation of a critical authentication bypass vulnerability (CVE-2024-55591) in its FortiOS a...
Preparing for the Quantum Era: Why Organizations Should...
The advent of quantum computing poses a serious challenge to traditional cryptographic algorithms, many of which form the backbone...
Apple Patches Zero-Day Exploit in Core Media Amid Activ...
Apple has rolled out software updates to fix several security vulnerabilities across its product line, including a zero-day flaw t...
GhostGPT: The Uncensored AI Chatbot Empowering Cybercri...
A newly launched AI chatbot, GhostGPT, has become a powerful tool for cybercriminals. It enables them to develop malware, execute ...
Personal Information Was Taken In A Council Cyber Attac...
The Number Of Residents Impacted By The Attack, Which Occurred In The Early Hours Of January 8, Is Unknown, According To Gateshead...
Over 100 Security Vulnerabilities in LTE and 5G Network...
A group of scholars has revealed more than 100 security flaws that affect LTE and 5G deployments.
Pwn2Own Contests See Several Hacks of Tesla Gear
This year's Pwn2Own Automotive hacking competition saw researchers successfully breach Tesla's electric vehicle (EV) charger with ...
Device settings are locked outside of trusted locations...
Google has introduced a new feature called Identity Check for supported Android devices, which enhances security by requiring biom...