Meta Removes 63,000 Instagram Accounts Linked to Nigerian Sextortion Scams

25/07/2024 0 Comments 0 tags

Meta Platforms on Wednesday said it took steps to remove around 63,000 Instagram accounts in Nigeria that were found to target people with financial sextortion scams. “These included a smaller

Webinar: Securing the Modern Workspace: What Enterprises MUST Know about Enterprise Browser Security

25/07/2024 0 Comments 0 tags

The browser is the nerve center of the modern workspace. Ironically, however, the browser is also one of the least protected threat surfaces of the modern enterprise. Traditional security tools

Researchers Reveal ConfusedFunction Vulnerability in Google Cloud Platform

25/07/2024 0 Comments 0 tags

Cybersecurity researchers have disclosed a privilege escalation vulnerability impacting Google Cloud Platform’s Cloud Functions service that an attacker could exploit to access other services and sensitive data in an unauthorized

Critical Docker Engine Flaw Allows Attackers to Bypass Authorization Plugins

25/07/2024 0 Comments 0 tags

Docker is warning of a critical flaw impacting certain versions of Docker Engine that could allow an attacker to sidestep authorization plugins (AuthZ) under specific circumstances. Tracked as CVE-2024-41110, the

CISA Warns of Exploitable Vulnerabilities in Popular BIND 9 DNS Software

25/07/2024 0 Comments 0 tags

The Internet Systems Consortium (ISC) has released patches to address multiple security vulnerabilities in the Berkeley Internet Name Domain (BIND) 9 Domain Name System (DNS) software suite that could be

New Chrome Feature Scans Password-Protected Files for Malicious Content

25/07/2024 0 Comments 0 tags

Google said it’s adding new security warnings when downloading potentially suspicious and malicious files via its Chrome web browser. “We have replaced our previous warning messages with more detailed ones

Telegram App Flaw Exploited to Spread Malware Hidden in Videos

24/07/2024 0 Comments 0 tags

A zero-day security flaw in Telegram’s mobile app for Android called EvilVideo made it possible for attackers to malicious files disguised as harmless-looking videos. The exploit appeared for sale for

How a Trust Center Solves Your Security Questionnaire Problem

24/07/2024 0 Comments 0 tags

Security questionnaires aren’t just an inconvenience — they’re a recurring problem for security and sales teams. They bleed time from organizations, filling the schedules of professionals with monotonous, automatable work.

Patchwork Hackers Target Bhutan with Advanced Brute Ratel C4 Tool

24/07/2024 0 Comments 0 tags

The threat actor known as Patchwork has been linked to a cyber attack targeting entities with ties to Bhutan to deliver the Brute Ratel C4 framework and an updated version

CrowdStrike Explains Friday Incident Crashing Millions of Windows Devices

24/07/2024 0 Comments 0 tags

Cybersecurity firm CrowdStrike on Wednesday blamed an issue in its validation system for causing millions of Windows devices to crash as part of a widespread outage late last week. “On