3 NIST Researchers Receive Presidential Rank Awards
All three were awarded the “Distinguished Rank,” the highest category of Presidential Rank Awards. Source:: NIST
Want to Grow Vulnerability Management into Exposure Management? Start Here!
Vulnerability Management (VM) has long been a cornerstone of organizational cybersecurity. Nearly as old as the discipline of...
Mitel MiCollab zero-day flaw gets proof-of-concept exploit
Researchers have uncovered an arbitrary file read zero-day in the Mitel MiCollab collaboration platform, allowing attackers to access...
Researchers Uncover 4-Month Cyberattack on U.S. Firm Linked to Chinese Hackers
A suspected Chinese threat actor targeted a large U.S. organization earlier this year as part of a four-month-long...
Our secret ingredient for reverse engineering
Nowadays, a lot of cybersecurity professionals use IDA Pro as their primary tool for reverse engineering. While IDA...
Vodafone-Three £16.5bn merger gets the go-ahead
The deal, which creates the UK’s biggest mobile network, has had to overcome competition concerns. Source:: BBC News...
ANEL and NOOPDOOR Backdoors Weaponized in New MirrorFace Campaign Against Japan
The China-linked threat actor known as MirrorFace has been attributed to a new spear-phishing campaign mainly targeting individuals...
NCA Busts Russian Crypto Networks Laundering Funds and Evading Sanctions
The U.K. National Crime Agency (NCA) on Wednesday announced that it led an international investigation to disrupt Russian...
CISA Warns of Active Exploitation of Flaws in Zyxel, ProjectSend, and CyberPanel
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added multiple security flaws affecting products from Zyxel, North Grid...
Will AWS’ next-gen Trainium2 chips accelerate AI development and put Amazon ahead in the chips race?
AWS appears to have upped the stakes in the AI infrastructure market this week with the rollout of...
Microsoft says having a TPM is “non-negotiable” for Windows 11
Microsoft made it abundantly clear this week that Windows 10 users won’t be able to upgrade to Windows...
Cisco NX-OS Software Image Verification Bypass Vulnerability
A vulnerability in the bootloader of Cisco NX-OS Software could allow an unauthenticated attacker with physical access to...
White House: Salt Typhoon hacked telcos in dozens of countries
Chinese state hackers, known as Salt Typhoon, have breached telecommunications companies in dozens of countries, President Biden’s deputy...
CompTIA courts IT newcomers with ‘on-ramp’ network, security courses
New learning resources from CompTIA are aimed at helping entry-level IT professionals to accelerate their career path to...
Secure shadow data in the cloud with new innovations on Zscaler DSPM
A dark journey for data in the cloud As we approach the end of 2024, the cloud and...
FBI shares tips on how to tackle AI-powered fraud schemes
The FBI warns that scammers are increasingly using artificial intelligence to improve the quality and effectiveness of their...
UK disrupts Russian money laundering networks used by ransomware
A law enforcement operation led by the United Kingdom’s National Crime Agency (NCA) has disrupted two Russian money...
BT unit took servers offline after Black Basta ransomware breach
Multinational telecommunications giant BT Group (formerly British Telecom) has confirmed that its BT Conferencing business division shut down...
New DroidBot Android malware targets 77 banking, crypto apps
A new Android banking malware named ‘DroidBot’ attempts to steal credentials for over 77 cryptocurrency exchanges and banking...
New DroidBot Android banking malware spreads across Europe
A new Android banking malware named ‘DroidBot’ attempts to steal credentials for over 77 cryptocurrency exchanges and banking...