Xiaomi Android Devices Hit by Multiple Flaws Across Apps and System Components

06/05/2024 0 Comments 0 tags

Multiple security vulnerabilities have been disclosed in various applications and system components within Xiaomi devices running Android. “The vulnerabilities in Xiaomi led to access to arbitrary activities, receivers and services with system

It Costs How Much?!? The Financial Pitfalls of Cyberattacks on SMBs

06/05/2024 0 Comments 0 tags

Cybercriminals are vipers. They’re like snakes in the grass, hiding behind their keyboards, waiting to strike. And if you’re a small- and medium-sized business (SMB), your organization is the ideal lair

Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities

04/05/2024 0 Comments 0 tags

Czechia and Germany on Friday revealed that they were the target of a long-term cyber espionage campaign conducted by the Russia-linked nation-state actor known as APT28, drawing condemnation from the European

New Guide Explains How to Eliminate the Risk of Shadow SaaS and Protect Corporate Data

03/05/2024 0 Comments 0 tags

SaaS applications are dominating the corporate landscape. Their increased use enables organizations to push the boundaries of technology and business. At the same time, these applications also pose a new security

Hackers Increasingly Abusing Microsoft Graph API for Stealthy Malware Communications

03/05/2024 0 Comments 0 tags

Threat actors have been increasingly weaponizing Microsoft Graph API for malicious purposes with the aim of evading detection. This is done to “facilitate communications with command-and-control (C&C) infrastructure hosted on Microsoft cloud services,” the Symantec Threat

Expert-Led Webinar – Uncovering Latest DDoS Tactics and Learn How to Fight Back

03/05/2024 0 Comments 0 tags

In today’s rapidly evolving digital landscape, the threat of Distributed Denial of Service (DDoS) attacks looms more significant than ever. As these cyber threats grow in sophistication, understanding and countering

Four Critical Vulnerabilities Expose HPE Aruba Devices to RCE Attacks

03/05/2024 0 Comments 0 tags

HPE Aruba Networking (formerly Aruba Networks) has released security updates to address critical flaws impacting ArubaOS that could result in remote code execution (RCE) on affected systems. Of the 10 security defects,

Google Announces Passkeys Adopted by Over 400 Million Accounts

03/05/2024 0 Comments 0 tags

Google on Thursday announced that passkeys are being used by over 400 million Google accounts, authenticating users more than 1 billion times over the past two years. “Passkeys are easy to use and

NSA, FBI Alert on N. Korean Hackers Spoofing Emails from Trusted Sources

03/05/2024 0 Comments 0 tags

The U.S. government on Thursday published a new cybersecurity advisory warning of North Korean threat actors’ attempts to send emails in a manner that makes them appear like they are from legitimate

Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw

02/05/2024 0 Comments 0 tags

Several popular Android applications available in Google Play Store are susceptible to a path traversal-affiliated vulnerability that could be exploited by a malicious app to overwrite arbitrary files in the vulnerable app’s home directory.