Data center provider fakes Tier 4 data center certificate to bag $11M SEC deal
Deepak Jain, CEO of a Maryland-based IT services firm, has been indicted for fraud and making false statements...
SideWinder APT Strikes Middle East and Africa With Stealthy Multi-Stage Attack
An advanced persistent threat (APT) actor with suspected ties to India has sprung forth with a flurry of...
SAS CTF and the many ways to persist a kernel shellcode on Windows 7
On May 18, 2024, Kaspersky’s Global Research & Analysis Team (GReAT), with the help of its partners, held...
U.S. Charges Two Sudanese Brothers for Record 35,000 DDoS Attacks
Federal prosecutors in the U.S. have charged two Sudanese brothers with running a distributed denial-of-service (DDoS) botnet for...
Critical Kubernetes Image Builder Vulnerability Exposes Nodes to Root Access Risk
A critical security flaw has been disclosed in the Kubernetes Image Builder that, if successfully exploited, could be...
Social media faces big changes under new Ofcom rules
Ofcom warns social media companies could face fines if they don’t comply with the new Online Safety Bill...
US ‘click to cancel’ rule to ban subscription traps
New rule requires businesses to make subscribing and cancelling subscriptions equally simple. Source:: BBC News – Technology
Iranian hackers act as brokers selling critical infrastructure access
Iranian hackers are breaching critical infrastructure organizations to collect credentials and network data that can be sold on...
How does WhatsApp make money? It’s free – with some tricks
We all use messaging apps such as Whatsapp for free, but what’s in it for them? Source:: BBC...
Cisco ATA 190 Series Analog Telephone Adapter Firmware Vulnerabilities
Multiple vulnerabilities in Cisco ATA 190 Series Analog Telephone Adapter firmware, both on-premises and multiplatform, could allow a...
Cisco UCS Central Software Configuration Backup Information Disclosure Vulnerability
A vulnerability in the backup feature of Cisco UCS Central Software could allow an attacker with access to...
Cisco Unified Contact Center Management Portal Reflected Cross-Site Scripting Vulnerability
A vulnerability in the web-based management interface of Cisco Unified Contact Center Management Portal (Unified CCMP) could allow...
Google: 70% of exploited flaws disclosed in 2023 were zero-days
Mandiant security analysts warn of a worrying new trend of threat actors demonstrating a better capability to discover...
Amazon S3 adds new Region and bucket name filtering for the ListBuckets API
Amazon S3 now supports AWS Region and bucket name filters for the ListBuckets API. In addition, paginated ListBuckets...
AWS Marketplace enables self-service creation of single AMI product listings for AWS GovCloud (US) Regions
AWS Marketplace now allows sellers to manage their Single Amazon Machine Images (AMIs) product availability in the AWS...
USDoD hacker behind National Public Data breach arrested in Brazil
A notorious hacker named USDoD, who is linked to the National Public Data and InfraGard breaches, has been...
AWS Marketplace now supports offers in four new currencies and non-US bank accounts for disbursement
AWS Marketplace announces support for sellers and channel partners to create contract pricing private offers in four new...
SolarWinds Web Help Desk flaw is now exploited in attacks
CISA has added three flaws to its ‘Known Exploited Vulnerabilities’ (KEV) catalog, among which is a critical hardcoded...
Amazon Transcribe now supports streaming transcription in 30 additional languages
Today, we are excited to announce support for 30 additional languages for streaming audio transcriptions bringing the total...
Survey: 71% of women in IT work long hours to climb ladder
Nearly three-fourths of women in IT said they work longer hours to improve their chances of career advancement,...