Zyxel CPE Devices Face Active Exploitation Due to Unpatched CVE-2024-40891 Vulnerability

29/01/2025 0 Comments 0 tags

Cybersecurity researchers are warning that a critical zero-day vulnerability impacting Zyxel CPE Series devices is seeing active exploitation attempts in the wild. “Attackers can leverage this vulnerability to execute arbitrary

AI in Cybersecurity: What’s Effective and What’s Not – Insights from 200 Experts

29/01/2025 0 Comments 0 tags

Curious about the buzz around AI in cybersecurity? Wonder if it’s just a shiny new toy in the tech world or a serious game changer? Let’s unpack this together in

PureCrypter Deploys Agent Tesla and New TorNet Backdoor in Ongoing Cyberattacks

28/01/2025 0 Comments 0 tags

A financially motivated threat actor has been linked to an ongoing phishing email campaign that has been ongoing since at least July 2024 specifically targeting users in Poland and Germany.

OAuth Redirect Flaw in Airline Travel Integration Exposes Millions to Account Hijacking

28/01/2025 0 Comments 0 tags

Cybersecurity researchers have disclosed details of a now-patched account takeover vulnerability affecting a popular online travel service for hotel and car rentals. “By exploiting this flaw, attackers can gain unauthorized

AI SOC Analysts: Propelling SecOps into the future

28/01/2025 0 Comments 0 tags

Triaging and investigating alerts is central to security operations. As SOC teams strive to keep up with ever-increasing alert volumes and complexity, modernizing SOC automation strategies with AI has emerged

Ransomware Targets ESXi Systems via Stealthy SSH Tunnels for C2 Operations

28/01/2025 0 Comments 0 tags

Cybersecurity researchers have found that ransomware attacks targeting ESXi systems are also leveraging the access to repurpose the appliances as a conduit to tunnel traffic to command-and-control (C2) infrastructure and

How Long Does It Take Hackers to Crack Modern Hashing Algorithms?

28/01/2025 0 Comments 0 tags

While passwords remain the first line of defense for protecting user accounts against unauthorized access, the methods for creating strong passwords and protecting them are continually evolving. For example, NIST

E.U. Sanctions 3 Russian Nationals for Cyber Attacks Targeting Estonia’s Key Ministries

28/01/2025 0 Comments 0 tags

The Council of the European Union has sanctioned three individuals for allegedly carrying out “malicious cyber activities” against Estonia. The three Russian nationals – Nikolay Alexandrovich Korchagin, Vitaly Shevchenko, and

Top-Rated Chinese AI App DeepSeek Limits Registrations Amid Cyberattacks

28/01/2025 0 Comments 0 tags

DeepSeek, the Chinese AI startup that has captured much of the artificial intelligence (AI) buzz in recent days, said it’s restricting registrations on the service, citing malicious attacks. “Due to

Apple Patches Actively Exploited Zero-Day Affecting iPhones, Macs, and More

28/01/2025 0 Comments 0 tags

Apple has released software updates to address several security flaws across its portfolio, including a zero-day vulnerability that it said has been exploited in the wild. The vulnerability, tracked as