Patch Tuesday Includes Microsoft Zero-Day Flaws in April Release

Microsoft zero-day proxy driver spoofing vulnerability (CVE-2024-26234) and SmartScreen prompt security feature bypass (CVE-2024-29988) require immediate patching  : OFFICIAL CVE-2024-26234 and CVE-2024-29988 INFO :  It’s the second Tuesday of April, which means ...
Cybercrime Predictions from an Industry Veteran: Scott Alldridge

Cybercrime Predictions from an Industry Veteran: Scott Alldridge

| | Cybersecurity
In the dynamic realm of cybersecurity, a shifting threat landscape demands attention ...

What is Session Hijacking?

Session hijacking is a prevalent and dangerous attack method frequently employed by cybercriminals to illicitly gain access and then take control of user accounts and systems. Session hijacking is a type of ...

Preparing for DORA Compliance

In the quest for DORA compliance, we offer a solution for financial services before the January 2025 deadline DORA compliance is born of the financial sector’s growing dependence on Information and Communications ...

PyPI Malicious Package Uploads Used To Target Developers

In light of the recent cybercriminal activity, new user sign-ups on the PyPI platform were halted. Currently, an increase in PyPI malicious package uploads is being deemed the reason behind the suspension ...

Satellite Cybersecurity is a Pressing Reality

Satellite cybersecurity has become a pressing issue, with critical infrastructure resting on telecom success  The importance of telecoms and satellite cybersecurity cannot be overstated. In the vast expanse of space, the critical ...
Exploiting limited markup features on web applications

Exploiting limited markup features on web applications

Limited features. Big vulnerabilities? Web applications might seem straightforward, but stripped-down code can create hidden weaknesses. Web applications that support limited markup in fields, such as comments, utilize a simplified... The post ...

CISA Warns of Volt Typhoon Risks to Critical Infrastructure

The recent joint warning issued by CISA, NSA, FBI, and other U.S. government and international partners highlights a critical cybersecurity threat: Volt Typhoon, a Chinese hacking group. This group has targeted critical ...

Finland Blames APT31 Hackers For Parliament Cyber Attack

APT31 Hackers, a Chinese threat actor group, has recently been accused by the Finnish police of attacking the nation’s parliament in 2020. According to recent reports, this attack is said to have ...
What value do Red Team exercises provide to security awareness programs?

Massive AT&T Data Leak, The Danger of Thread Hijacking

Episode 324 features discussions on a significant AT&T data breach affecting 73 million customers and a sophisticated thread jacking attack targeting a journalist. Co-host Scott Wright joins the discussion, highlighting how millions ...