cyber security
CISA Issues Secure Practices for Cloud Services To Strengthen U.S Federal Agencies
In a decisive move to bolster cloud security, the Cybersecurity and Infrastructure Security Agency (CISA) has issued Binding Operational Directive (BOD) 25-01: Implementing Secure Practices for Cloud Services.This...
cyber security
DMD Diamond Launches Open Beta for v4 Blockchain Ahead of 2025 Mainnet
DMD Diamond - one of the oldest blockchain projects in the space has announced the start of Open Beta for the DMD Diamond v4 blockchain.Established...
cyber security
Microsoft Patch Tuesday December 2024, 71 Vulnerabilities Fixed Including 1 Zero-day
In its final Patch Tuesday of 2024, Microsoft has released a significant security update addressing a total of 71 vulnerabilities, including 16 critical vulnerabilities...
Cyber Crime
Sophisticated Celestial Stealer Targets Browsers to Steal Login Credentials
Researchers discovered Celestial Stealer, a JavaScript-based MaaS infostealer targeting Windows systems that, evading detection with obfuscation and anti-analysis techniques, steals data from various browsers,...
Cyber Attack
Deloitte Hacked – Brain Cipher Group Claim to Have Stolen 1 TB of Data
Brain Cipher has claimed to have breached Deloitte UK and exfiltrated over 1 terabyte of sensitive data.Emerging in June 2024, Brain Cipher has quickly...
cyber security
Shut Down Phishing Attacks -Detection & Prevention Checklist
In today's interconnected world, where digital communication and transactions dominate, phishing attacks have become an ever-present threat.By masquerading as trustworthy entities, phishing attacks deceive...
cyber security
Why the MITRE ATT&CK Evaluation Is Essential for Security Leaders
In today’s dynamic threat landscape, security leaders are under constant pressure to make informed choices about which solutions and strategies they employ to protect...
Computer Security
Firefox 133.0 Released with Multiple Security Updates – What’s New!
Mozilla has officially launched Firefox 133.0, offering enhanced features, significant performance improvements, and critical security fixes.This latest release enhances privacy, developer tools, and enterprise...
Cyber Crime
Researchers Detailed Tools Used By Hacktivists Fueling Ransomware Attacks
CyberVolk, a politically motivated hacktivist group, has leveraged readily available ransomware builders like AzzaSec, Diamond, LockBit, and Chaos to launch DDoS and ransomware attacks...
cyber security
Dell Wyse Management Suite Vulnerabilities Let Attackers Exploit Affected Systems Remotely
Dell Technologies has released a security update for its Wyse Management Suite (WMS) to address multiple vulnerabilities that could allow malicious users to compromise...
Cyber Attack
IBM Workload Scheduler Vulnerability Stores User Credentials in Plain Text
IBM has issued a security bulletin warning customers about a vulnerability in its Workload Scheduler software that allows user credentials to be stored in...