Jamf Threat Labs subverts iPhone security with fake Airplane Mode
Fresh security research from Jamf Threat Labs may not reflect an active attack, but it does illustrate the...
A Levels: Tech degree applications rise, but female students remain outnumbered
Data published by UCAS (The Universities and Colleges Admissions Service) has found that for the second year running,...
New LABRAT Campaign Exploits GitLab Flaw for Cryptojacking and Proxyjacking Activities
A new, financially motivated operation dubbed LABRAT has been observed weaponizing a now-patched critical flaw in GitLab as part of...
New Apple iOS 16 Exploit Enables Stealthy Cellular Access Under Fake Airplane Mode
Cybersecurity researchers have documented a novel post-exploit persistence technique on iOS 16 that could be abused to fly...
Cybersecurity and Privacy Mapping Guide: Draft NIST IR 8477 Available for Comment
NIST has released the initial public draft (ipd) of a new report for public comment: NIST Internal Report...
NIST Delivers Report on American Competitiveness in Critical High-Tech Industries
The American COMPETE Act report analyzes economic impact, supply chain vulnerabilities, and policy recommendations. Source:: NIST
Why You Need Continuous Network Monitoring?
Changes in the way we work have had significant implications for cybersecurity, not least in network monitoring. Workers...
‘Sexist’ Amazon Alexa can’t answer Lionesses question
Amazon admits error after voice assistant replied to semi-final query by saying there was no match. Source:: BBC...
Meet your secret Android shortcut genie
The beauty of Android is that there’s never a shortage of creative and compelling apps that completely change...
China hacks the US military and government— the Feds blame Microsoft
Hidden in the basic infrastructure that runs the US military is a powerful piece of Windows-borne Chinese malware...
Russian Hackers Use Zulip Chat App for Covert C&C in Diplomatic Phishing Attacks
An ongoing campaign targeting ministries of foreign affairs of NATO-aligned countries points to the involvement of Russian threat...
Hozier would consider strike over AI threat to music
The musician says he is not sure music made by artificial intelligence meets “the definition of art”. Source::...
CISA Adds Citrix ShareFile Flaw to KEV Catalog Due to In-the-Wild Attacks
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical security flaw in Citrix ShareFile storage...
ClamAV HFS+ File Scanning Infinite Loop Denial of Service Vulnerability
A vulnerability in the filesystem image parser for Hierarchical File System Plus (HFS+) of ClamAV could allow an...
ClamAV AutoIt Module Denial of Service Vulnerability
A vulnerability in the AutoIt module of ClamAV could allow an unauthenticated, remote attacker to cause a denial...
Cisco Unified Contact Center Express Finesse Portal Web Cache Poisoning Vulnerability
A vulnerability in the Tomcat implementation for Cisco Unified Contact Center Express (Unified CCX) could allow an unauthenticated,...
Cisco Unified Communications Products Cross-Site Scripting Vulnerability
A vulnerability in the web-based management interface of Cisco Unified Communications Manager (Unified CM), Cisco Unified CM Session...
Cisco Unified Communications Manager SQL Injection Vulnerability
A vulnerability in the web-based management interface of Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications...
Cisco Umbrella Virtual Appliance Undocumented Support Tunnel Vulnerability
A vulnerability in the remote support feature of Cisco Umbrella Virtual Appliance could allow an authenticated, remote attacker...
Cisco ThousandEyes Enterprise Agent Virtual Appliance Privilege Escalation Vulnerability
A vulnerability in the CLI of Cisco ThousandEyes Enterprise Agent, Virtual Appliance installation type, could allow an authenticated,...