cyber security
China-Backed Hackers Target Exiled Uyghur Community with Malicious Software
Senior members of the World Uyghur Congress (WUC) living in exile were targeted with a sophisticated spearphishing campaign delivering malware through a seemingly legitimate Uyghur language text editor.
The...
cyber security
Cisco IOS Software SISF Vulnerability Could Enable Attackers to Launch DoS Attacks
Cisco has released security updates addressing a critical vulnerability in the Switch Integrated Security Features (SISF) of multiple software platforms that could allow unauthenticated...
cyber security
Cyber Espionage Campaign Targets Uyghur Exiles with Trojanized Language Software
A sophisticated cyberattack targeted senior members of the World Uyghur Congress (WUC), the largest Uyghur diaspora organization, using a weaponized version of UyghurEditPP-a trusted...
cyber security
7 Best Third-Party Risk Management Software in 2025
Whether you operate a small business or run a large enterprise, you rely on third-party suppliers, merchants or software providers.
They are fundamental to...
cyber security
Satellite Weather Software Vulnerabilities Let Attackers Execute Code Remotely
IBL Software Engineering has disclosed a significant security vulnerability, identified as CVE-2025-1077, affecting its Visual Weather software and derivative products, including Aero Weather, Satellite...
Browser
Lazarus Group Exploits Trusted Apps for Data Theft via Dropbox
In an alarming development, North Korea’s infamous Lazarus Group has been linked to a global cyber espionage campaign, code-named Operation Phantom Circuit.
Beginning in September...
Backdoor
Lazarus Hackers Tamper with Software Packages to Gain Backdoor Access to the Victims Device
A recent investigation conducted by STRIKE, a division of SecurityScorecard, has unveiled the intricate and far-reaching operation of the Lazarus Group, a North Korean...
Cyber Security News
CISA Releases Guidelines For Closing Software Understanding Gap
The Cybersecurity and Infrastructure Security Agency (CISA) has released a pivotal report calling for urgent action to address the “software understanding gap.”
This comprehensive document...
Cyber Security News
CACTUS Hackers Exploiting Software Bug to Attack Corporate Networks
Threat actors known as CACTUS orchestrated a sophisticated attack on two companies simultaneously, exploiting a software vulnerability within 24 hours of its disclosure.
This...
Cyber Security News
System Admin Pleads Guilty for Selling Pirated Business Phone Software Licenses
For taking part in a large international scheme to earn millions of dollars by selling pirated business telephone system software licenses, a computer system admin...
Business
Stages Of Systems Development Life Cycle: A Comprehensive Guide
Many techniques can both simplify and complicate a developer's work. Of course, we are here to make it easier and better.
Today we will...