Tag: Cyber defense

news-19072024-183202

Beware of Fake CrowdStrike Outage Scams: How to Stay Safe

The security firm CrowdStrike made a mistake with a software update that caused chaos for Windows computers. As the fallout continues, there is a...
news-19072024-183113

Why Cyber Resilience is Essential: Lessons from CrowdStrike’s IT Outage

Cyber resilience is crucial for any business, as demonstrated by the recent IT outage caused by a misconfigured content update released by CrowdStrike. The...
news-16072024-021549

Uncovering the Hidden Backdoor in Fake AWS Files: A Closer Look

Recently, researchers discovered that two fake AWS packages on the NPM JavaScript repository contained hidden code that backdoored developers' computers when executed. These packages,...
news-11072024-023448

Exploitation of Windows 0-day by Threat Actors for Over a Year

Threat actors have been exploiting a zero-day vulnerability in Windows, targeting users with malware for over a year. This vulnerability affected both Windows 10...
news-10072024-022928

Blast-RADIUS MD5-Based Vulnerability in RADIUS Protocol: A Detailed Overview

The RADIUS protocol, commonly used for network authentication, is currently facing a significant vulnerability known as the Blast-RADIUS MD5-based vulnerability. This vulnerability poses a...
news-06072024-221243

Securing Space: Examining Potential Cyberattacks and Precautionary Measures

Space systems, which include satellites and the International Space Station, are vulnerable to cyberattacks. These attacks could have serious consequences, such as disrupting GPS...
news-02072024-065003

Malware Campaign Targets Cisco Nexus Switches: What You Need to Know

Chinese hackers have been discovered exploiting a zero-day vulnerability in specific Cisco switches to control the devices and install malware. The discovery was made...
news-26062024-191059

Russian civilian charged for helping GRU spies target Ukrainian government systems with malware

The Department of Justice has accused a Russian civilian, Amin Stigal, of being involved in a conspiracy to attack Ukrainian government computer systems with...
news-25062024-000710

Securing Your Network: Why You Should Never Assume the End of an Attack Infrastructure

In February 2024, Operation Cronos, a coalition of international law enforcement agencies led by the UK’s National Crime Agency and the U.S. FBI, seized...

BREAKING NEWS

Top News