Significant Vulnerability in Open VSX Registry Poses Risk of Supply Chain Attacks for Millions of Developers
Cybersecurity researchers have identified a significant vulnerability in the Open VSX Registry (open-vsx.org), which, if successfully exploited, could allow attackers to gain control over the entire Visual Studio Code…
Cybersecurity researchers have identified a significant vulnerability in the Open VSX Registry (open-vsx.org), which, if successfully exploited, could allow attackers to gain control over the entire Visual Studio Code…
Hundreds of MCP Servers Vulnerable to Remote Code Execution and Data Exposure
A growing number of Model Context Protocol (MCP) servers, which are linked to artificial intelligence, have been identified as misconfigured and vulnerable to significant security threats. Recent research reveals…
A growing number of Model Context Protocol (MCP) servers, which are linked to artificial intelligence, have been identified as misconfigured and vulnerable to significant security threats. Recent research reveals…
Preventive Detention of Cyber Offenders: Supreme Court of Tamil Nadu Approves Measures to Mitigate Cybercrime Risks
The Supreme Court has affirmed the Tamil Nadu government’s initiative to implement preventive detention laws targeting cybercriminals. Justices Sandeep Mehta and Joymalya Bagchi described this action as a commendable…
The Supreme Court has affirmed the Tamil Nadu government’s initiative to implement preventive detention laws targeting cybercriminals. Justices Sandeep Mehta and Joymalya Bagchi described this action as a commendable…
Flowable Recognized in the Latest Gartner® Market Guide for Business Process Automation Tools
Zurich-based automation platform Flowable has been recognized as a Representative Vendor in the latest Gartner report on business process automation platforms. This recognition underscores Flowable’s commitment to providing advanced…
Zurich-based automation platform Flowable has been recognized as a Representative Vendor in the latest Gartner report on business process automation platforms. This recognition underscores Flowable’s commitment to providing advanced…
The Ineffectiveness of the Do Not Call Registry in Contemporary Telecommunication Privacy
The Do Not Call Registry has faced significant criticism online for its ineffectiveness in preventing unsolicited calls. Many users express frustration over the continued receipt of telemarketing calls despite…
The Do Not Call Registry has faced significant criticism online for its ineffectiveness in preventing unsolicited calls. Many users express frustration over the continued receipt of telemarketing calls despite…
FTC Authorizes $126 Million in Refunds for Fortnite Due to Manipulative Design Practices
The Federal Trade Commission (FTC) has sanctioned $126 million in refunds to be disbursed to 969,173 Fortnite players, following a settlement concerning allegations against Epic Games for utilizing manipulative…
The Federal Trade Commission (FTC) has sanctioned $126 million in refunds to be disbursed to 969,173 Fortnite players, following a settlement concerning allegations against Epic Games for utilizing manipulative…
Severe Remote Code Execution Vulnerabilities in Cisco ISE and ISE-PIC Enable Unauthenticated Access to Root Privileges
Cisco has released updates to address two critical-severity security vulnerabilities in its Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC), which could allow unauthenticated attackers to execute…
Cisco has released updates to address two critical-severity security vulnerabilities in its Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC), which could allow unauthenticated attackers to execute…
Patient Death Associated with NHS Cyber-Attack
A patient’s death has been officially attributed to the ransomware attack on Synnovis, the pathology services provider for multiple NHS hospitals in London, which occurred in 2024. This cyber…
A patient’s death has been officially attributed to the ransomware attack on Synnovis, the pathology services provider for multiple NHS hospitals in London, which occurred in 2024. This cyber…
Columbia University Computer Systems Compromised by Potential Cyberattack
A potential cyberattack has led to extensive computer system outages at Columbia University for a second consecutive day. As of Wednesday, the university’s engineering team has been diligently investigating…
A potential cyberattack has led to extensive computer system outages at Columbia University for a second consecutive day. As of Wednesday, the university’s engineering team has been diligently investigating…
The Role of Email, Cryptocurrency Wallets, and YouTube Activity in Uncovering IntelBroker to the FBI
The Federal Bureau of Investigation (FBI) conducted a thorough investigation into the activities of IntelBroker, a prominent figure operating under the alias Kai West in the United Kingdom. Utilizing…
The Federal Bureau of Investigation (FBI) conducted a thorough investigation into the activities of IntelBroker, a prominent figure operating under the alias Kai West in the United Kingdom. Utilizing…
Ahold Delhaize Reports Data Breach Impacting 2.2 Million Individuals
Ahold Delhaize, a prominent global food retail chain, has alerted over 2.2 million individuals regarding the unauthorized access and theft of their personal, financial, and health information due to…
Ahold Delhaize, a prominent global food retail chain, has alerted over 2.2 million individuals regarding the unauthorized access and theft of their personal, financial, and health information due to…
Analysis of PUBLOAD and Pubshell Malware in Mustang Panda’s Targeted Operations against Tibet
A China-linked threat actor, identified as Mustang Panda, has launched a new cyber espionage campaign targeting the Tibetan community.
The spear-phishing attacks exploit topics pertinent to Tibet, including the…
A China-linked threat actor, identified as Mustang Panda, has launched a new cyber espionage campaign targeting the Tibetan community.
The spear-phishing attacks exploit topics pertinent to Tibet, including the…
Hawaiian Airlines Experiences Cybersecurity Incident
Hawaiian Airlines has recently experienced a cybersecurity incident that has affected some of its IT systems. The airline officially acknowledged this “cybersecurity event” through two updates on its website…
Hawaiian Airlines has recently experienced a cybersecurity incident that has affected some of its IT systems. The airline officially acknowledged this “cybersecurity event” through two updates on its website…
Privacy Commissioner Conducts Review of Reported Data Breach Involving Ontario Health atHome
Both Ontario’s privacy commissioner and Ontario Health are currently investigating a reported data breach involving Ontario Health atHome, the province’s home-care coordination service. Allegations from the Ontario Liberals suggest…
Both Ontario’s privacy commissioner and Ontario Health are currently investigating a reported data breach involving Ontario Health atHome, the province’s home-care coordination service. Allegations from the Ontario Liberals suggest…
Emerging Stealthy Remcos Malware Campaigns Being Deployed Against Corporate and Educational Institutions
Forcepoint’s X-Labs has identified a notable trend in the utilization of Remcos malware, which is increasingly delivered through sophisticated phishing emails originating from compromised accounts. These new strategies highlight…
Forcepoint’s X-Labs has identified a notable trend in the utilization of Remcos malware, which is increasingly delivered through sophisticated phishing emails originating from compromised accounts. These new strategies highlight…
Phishing Attempt Concealed in Deceptive DocuSign Email
On a routine security assessment, a phishing attempt was identified that employed a clever delivery mechanism. What appeared to be a standard DocuSign notification evolved into a sophisticated deception…
On a routine security assessment, a phishing attempt was identified that employed a clever delivery mechanism. What appeared to be a standard DocuSign notification evolved into a sophisticated deception…
Scattered Spider Cyber Threat Actors Redirect Operations Towards Aviation and Transportation Industries
Threat actors associated with the “Scattered Spider” group have broadened their operational scope to encompass the aviation and transportation sectors, following prior assaults on insurance and retail industries.
Employing…
Threat actors associated with the “Scattered Spider” group have broadened their operational scope to encompass the aviation and transportation sectors, following prior assaults on insurance and retail industries.
Employing…
Exploitation of Over 1,000 SOHO Devices Linked to LapDogs Cyber Espionage Campaign with Chinese Ties
Threat hunters recently identified a substantial network of over 1,000 compromised small office and home office (SOHO) devices, which have been instrumental in supporting a long-running cyber espionage campaign…
Threat hunters recently identified a substantial network of over 1,000 compromised small office and home office (SOHO) devices, which have been instrumental in supporting a long-running cyber espionage campaign…
Exploitation of CitrixBleed 2 Vulnerability
A critical vulnerability has been identified in Citrix NetScaler ADC and Gateway devices, echoing the notorious CitrixBleed flaw from 2023. This newly discovered issue, referred to as CitrixBleed 2,…
A critical vulnerability has been identified in Citrix NetScaler ADC and Gateway devices, echoing the notorious CitrixBleed flaw from 2023. This newly discovered issue, referred to as CitrixBleed 2,…
Security Advisory: Scattered Spider Expands Target List to Include North American Airline and Transportation Sectors
ALERT: Scattered Spider has expanded its target list to include North American airline and transportation organizations. Mandiant, a division of Google Cloud, has identified several incidents within the airline…
ALERT: Scattered Spider has expanded its target list to include North American airline and transportation organizations. Mandiant, a division of Google Cloud, has identified several incidents within the airline…