admin

Microsoft MFA AuthQuake Flaw: The Silent Threat of Unlimited Brute-Force Attempts

Microsoft MFA AuthQuake Flaw: The Silent Threat of Unlimited Brute-Force Attempts

Critical Vulnerability in Microsoft MFA Cybersecurity researchers have identified a critical vulnerability in Microsoft’s multi-factor authentication (MFA) implementation. This flaw allows attackers to bypass MFA effortlessly, granting unauthorized access to victim accounts. Fortunately, understanding the issue can help users and organizations adopt preventive measures. What is Multi-Factor Authentication? Multi-factor authentication adds an extra layer of…

Read More
Top 10 Cybersecurity Threats to Watch Out For in 2021

Top 10 Cybersecurity Threats to Watch Out For in 2021

Cyber Attacks Linked to China-Based Threat Actors A suspected China-based threat actor has been linked to a series of cyber attacks targeting high-profile organizations in Southeast Asia since at least October 2023. This cyber espionage campaign is notable for its extensive reach, impacting various sectors. The targets include government ministries in two different countries, an…

Read More
Chinese EagleMsgSpy Spyware Found Exploiting Mobile Devices Since 2017

Chinese EagleMsgSpy Spyware Found Exploiting Mobile Devices Since 2017

Introduction: New Cyber Surveillance Tool Uncovered Cybersecurity researchers have identified a new surveillance program believed to be employed by Chinese police departments. This tool, referred to as EagleMsgSpy, is a lawful intercept software designed to extract a wide variety of information from mobile devices. Its discovery raises significant concerns about privacy and state surveillance. Since…

Read More
"Microsoft's Latest Security Update: Patching 72 Flaws, Including Critical CLFS Vulnerability"

“Microsoft’s Latest Security Update: Patching 72 Flaws, Including Critical CLFS Vulnerability”

Microsoft's December Patch Tuesday: A Critical Update Microsoft closed out its Patch Tuesday updates for 2024 with significant attention to security. The company addressed 72 security flaws across its software portfolio, one of which has been actively exploited in the wild. This update underscores the importance of vigilance in digital security as vulnerabilities can lead…

Read More
Top 10 Cybersecurity Threats You Need to Know in 2021

Top 10 Cybersecurity Threats You Need to Know in 2021

The U.S. government recently unsealed charges against a Chinese national accused of a significant cyber breach that affected thousands of Sophos firewall devices worldwide in 2020. Guan Tianfeng, also known by his online handles gbigmao and gxiaomao, is believed to have had ties with Sichuan Silence Information Technology Company, Limited. The charges brought against him…

Read More
Ukradene podatke: 122M edinstvenih poslovnih e-poštnih naslovov prizadetih - Kibernetska varnost - Napad podatkov.

Ukradene podatke: 122M edinstvenih poslovnih e-poštnih naslovov prizadetih – Kibernetska varnost – Napad podatkov.

B2B platforma za generacijo povpraševanja, ki jo upravlja podjetje Pure Incubation, je doživela resen varnostni prelom. Ta incident je razkril občutljive poslovne kontaktne informacije, kar je resno ogrozilo varnost podatkov v poslovnem sektorju. S približno 122 milijoni edinstvenih poslovnih elektronskih naslovov je to uhajanje povzročilo velike pomisleke glede zasebnosti in varnosti podatkov. Prelom in njegov…

Read More
Ivanti's Crucial Updates for CSA and Connect Secure Vulnerabilities

Ivanti’s Crucial Updates for CSA and Connect Secure Vulnerabilities

Ivanti Issues Critical Security Updates: Addressing Privilege Escalation and Code Execution Flaws Ivanti has recently announced important security updates that tackle multiple critical vulnerabilities within its Cloud Services Application (CSA) and Connect Secure products. These vulnerabilities present serious risks, including privilege escalation and potential code execution threats. Organizations using these services should act swiftly to…

Read More
Secure Your Systems: Cleo File Transfer Vulnerability Alert and How to Protect Your Data

Secure Your Systems: Cleo File Transfer Vulnerability Alert and How to Protect Your Data

Urgent Security Warning for Cleo Users: Protect Your File Transfer Software Recent reports indicate a significant risk for users of Cleo-managed file transfer software. Cybersecurity firm Huntress has discovered that threat actors are exploiting a vulnerability affecting fully patched systems. This situation escalated on December 3, 2024, urging all users to take immediate action to…

Read More
Fake Recruiters Spread Banking Trojan in Phishing Scam

Fake Recruiters Spread Banking Trojan in Phishing Scam

Understanding the Latest Mishing Campaign Targeting Mobile Users Cybersecurity researchers have recently uncovered a sophisticated mobile phishing campaign, also known as mishing, aimed at distributing an updated version of the Antidot banking trojan. This hidden threat involves attackers posing as recruiters, enticing unsuspecting victims with fraudulent job offers. By deceiving victims into believing they are…

Read More