Hacking the Human Mind: Exploiting Vulnerabilities in the ‘First Line of Cyber Defense’

07/12/2023 0 Comments 0 tags

Humans are complex beings with consciousness, emotions, and the capacity to act based on thoughts. In the ever-evolving realm of cybersecurity, humans consistently remain primary targets for attackers. Over the

New Bluetooth Flaw Let Hackers Take Over Android, Linux, macOS, and iOS Devices

07/12/2023 0 Comments 0 tags

A critical Bluetooth security flaw could be exploited by threat actors to take control of Android, Linux, macOS and iOS devices. Tracked as CVE-2023-45866, the issue relates to a case of

Microsoft Warns of COLDRIVER’s Evolving Evading and Credential-Stealing Tactics

07/12/2023 0 Comments 0 tags

The threat actor known as COLDRIVER has continued to engage in credential theft activities against entities that are of strategic interests to Russia while simultaneously improving its detection evasion capabilities.

Meta Launches Default End-to-End Encryption for Chats and Calls on Messenger

07/12/2023 0 Comments 0 tags

Meta has officially begun to roll out support for end-to-end encryption (E2EE) in Messenger for personal calls and one-to-one personal messages by default in what it called the “most significant milestone yet.”

New Stealthy ‘Krasue’ Linux Trojan Targeting Telecom Firms in Thailand

07/12/2023 0 Comments 0 tags

A previously unknown Linux remote access trojan called Krasue has been observed targeting telecom companies in Thailand by threat actors to main covert access to victim networks at lease since

Qualcomm Releases Details on Chip Vulnerabilities Exploited in Targeted Attacks

06/12/2023 0 Comments 0 tags

Chipmaker Qualcomm has released more information about three high-severity security flaws that it said came under “limited, targeted exploitation” back in October 2023. The vulnerabilities are as follows – CVE-2023-33063 (CVSS score: 7.8)

Atlassian Releases Critical Software Fixes to Prevent Remote Code Execution

06/12/2023 0 Comments 0 tags

Atlassian has released software fixes to address four critical flaws in its software that, if successfully exploited, could result in remote code execution. The list of vulnerabilities is below – CVE-2022-1471 (CVSS score:

Hackers Exploited ColdFusion Vulnerability to Breach Federal Agency Servers

06/12/2023 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) warned of active exploitation of a high-severity Adobe ColdFusion vulnerability by unidentified threat actors to gain initial access to government servers. “The vulnerability in

Scaling Security Operations with Automation

06/12/2023 0 Comments 0 tags

In an increasingly complex and fast-paced digital landscape, organizations strive to protect themselves from various security threats. However, limited resources often hinder security teams when combatting these threats, making it

Sierra:21 – Flaws in Sierra Wireless Routers Expose Critical Sectors to Cyber Attacks

06/12/2023 0 Comments 0 tags

A collection of 21 security flaws have been discovered in Sierra Wireless AirLink cellular routers and open-source software components like TinyXML and OpenNDS. Collectively tracked as Sierra:21, the issues expose over 86,000 devices across