Cybersecurity researchers have revealed that the Russian cyber group Secret Blizzard is behind recent sophisticated cyberattacks targeting Ukrainian military and government entities. The group, known for its stealth …
Penelope Iroko
-
-
News & Resources
December ICS Patch Tuesday Highlights Siemens, Schneider, and CISA Updates
by Penelope Iroko 2 minutes readIf you rely on industrial automation systems, this December’s ICS Patch Tuesday security updates are critical. Companies like Siemens, Schneider Electric, and others have issued vital advisories addressing …
-
News & ResourcesVulnerabilities & Exploits
SAP Fixes Critical NetWeaver SSRF Vulnerability
by Penelope Iroko 2 minutes readSAP has addressed a major security concern by releasing patches for a critical SAP Critical NetWeaver SSRF vulnerability during its December 2024 Security Patch Day. This vulnerability, a …
-
News & ResourcesVulnerabilities & Exploits
Critical OpenWrt Vulnerability Risks Malicious Firmware Updates
by Penelope Iroko 2 minutes readA newly discovered OpenWrt vulnerability risks exposing users to malicious firmware updates, putting countless embedded devices at risk. This flaw, tracked as CVE-2024-54143, affects the sysupgrade server used …
-
News & Resources
Radiant Capital Hack: North Korean Group Steals $50 Million
by Penelope Iroko 2 minutes readIn a chilling display of cyber sophistication, the Radiant Capital hack resulted in the theft of $50 million, with investigations pointing to a North Korean threat group as …
-
News & ResourcesIdentity and Access Management
Microsoft Enhances NTLM Relay Attack Protections
by Penelope Iroko 2 minutes readCybersecurity threats are evolving, and staying ahead of attackers is critical. Recognizing this, Microsoft has introduced NTLM relay attack protections as default features in Exchange servers, LDAP, and …
-
News & Resources
Microsoft Prompt Injection Challenge Hackers with $10K for Prompt Injection Exploits
by Penelope Iroko 2 minutes readMicrosoft has launched a bold new initiative with its Microsoft prompt injection challenge, inviting ethical hackers to test the security of its innovative LLM-based email client. Offering up …
-
News & ResourcesIoT Security
Cisco Uncovers Unpatched Vulnerabilities in IoT Routers and BGP Tools
by Penelope Iroko 2 minutes readThe persistence of unpatched vulnerabilities in IoT routers and network tools poses a serious threat to industrial systems and internet infrastructure. Cisco Talos recently revealed that several critical …
-
News & ResourcesRansomware
Artivion Ransomware Attack Disrupts Medical Device Operations
by Penelope Iroko 2 minutes readThe Artivion ransomware attack has disrupted critical operations for the global medical device manufacturer, causing interruptions in order and shipping processes. The attack, identified on November 21, forced …
-
News & Resources
How Socks5Systemz Botnet Powers Proxy.AM with 85,000+ Devices
by Penelope Iroko 2 minutes readHave you ever wondered how cybercriminals exploit hacked devices to fuel their operations? Socks5Systemz botnet powers Proxy.AM, a controversial proxy service, which is using over 85,000 compromised systems …