PyPI Implements Mandatory Two-Factor Authentication for Project Owners

30/05/2023 0 Comments 0 tags

The Python Package Index (PyPI) announced last week that every account that maintains a project on the official third-party software repository will be required to turn on two-factor authentication (2FA)

Hackers Win $105,000 for Reporting Critical Security Flaws in Sonos One Speakers

30/05/2023 0 Comments 0 tags

Multiple security flaws uncovered in Sonos One wireless speakers could be potentially exploited to achieve information disclosure and remote code execution, the Zero Day Initiative (ZDI) said in a report published last

New Stealthy Bandit Stealer Targeting Web Browsers and Cryptocurrency Wallets

27/05/2023 0 Comments 0 tags

A new stealthy information stealer malware called Bandit Stealer has caught the attention of cybersecurity researchers for its ability to target numerous web browsers and cryptocurrency wallets.  “It has the

Critical OAuth Vulnerability in Expo Framework Allows Account Hijacking

27/05/2023 0 Comments 0 tags

A critical security vulnerability has been disclosed in the Open Authorization (OAuth) implementation of the application development framework Expo.io. The shortcoming, assigned the CVE identifier CVE-2023-28131, has a severity rating of

Severe Flaw in Google Cloud’s Cloud SQL Service Exposed Confidential Data

26/05/2023 0 Comments 0 tags

A new security flaw has been disclosed in the Google Cloud Platform’s (GCP) Cloud SQL service that could be potentially exploited to obtain access to confidential data. “The vulnerability could

Predator Android Spyware: Researchers Uncover New Data Theft Capabilities

26/05/2023 0 Comments 0 tags

Security researchers have shared a deep dive into the commercial Android spyware called Predator, which is marketed by the Israeli company Intellexa (previously Cytrox). Predator was first documented by Google’s Threat Analysis

5 Must-Know Facts about 5G Network Security and Its Cloud Benefits

26/05/2023 0 Comments 0 tags

5G is a game changer for mobile connectivity, including mobile connectivity to the cloud. The technology provides high speed and low latency when connecting smartphones and IoT devices to cloud

Barracuda Warns of Zero-Day Exploited to Breach Email Security Gateway Appliances

26/05/2023 0 Comments 0 tags

Email protection and network security services provider Barracuda is warning users about a zero-day flaw that it said has been exploited to breach the company’s Email Security Gateway (ESG) appliances.

New COSMICENERGY Malware Exploits ICS Protocol to Sabotage Power Grids

26/05/2023 0 Comments 0 tags

A new strain of malicious software that’s engineered to penetrate and disrupt critical systems in industrial environments has been unearthed. Google-owned threat intelligence firm Mandiant dubbed the malware COSMICENERGY, adding it

Cynet Protects Hospital From Lethal Infection

25/05/2023 0 Comments 0 tags

A hospital with 2,000 employees in the E.U. deployed Cynet protections across its environment. The hospital was in the process of upgrading several expensive imaging systems that were still supported