Germany’s Federal Office for Information Security (BSI) has successfully dismantled a massive botnet comprising 30,000 internet-connected devices infected with BadBox malware. These devices, including photo frames and streaming…
Threats & Attacks
-
-
NewsVulnerabilities
Microsoft Fixes Critical Windows Defender and Update Catalog Vulnerabilities
by Penelope Iroko 2 minutes readMicrosoft has addressed two critical vulnerabilities in Windows Defender and Update Catalog, ensuring users remain protected from potential cyber threats. These vulnerabilities could have led to information exposure…
-
LockbitBest Practices
LockBit Best Practices: Essential Tips to Prevent Attacks
by Clement Brako Akomea 5 minutes readThere’s a significant rise in ransomware attacks, particularly from aggressive threats like LockBit, targeting businesses and individuals alike. To safeguard your data and maintain operational integrity, adopting effective…
-
NewsVulnerabilities
Cleo Vulnerability Exploitation Linked to Termite Ransomware Group
by Penelope Iroko 2 minutes readCybersecurity experts have revealed a major security flaw in Cleo’s file transfer tools that has been actively exploited by a new ransomware group known as Termite. This Cleo…
-
NewsVulnerabilities
AMD Processor Vulnerability Attack: $10 BadRAM Exploit Exposed
by Penelope Iroko 2 minutes readImagine a world where just $10 of off-the-shelf equipment could bypass advanced processor protections. That’s exactly what researchers have revealed with the AMD processor vulnerability attack, a groundbreaking…
-
Cloud SecurityNewsVulnerabilities
Ivanti Security Updates to Fix Critical Cloud Services Vulnerabilities
by CSC Newsby CSC News 2 minutes readKeeping your systems secure is more important than ever. Ivanti, a leader in enterprise IT software, has rolled out Ivanti security updates to address multiple critical vulnerabilities in…
-
LockBit ransomware presents a significant threat to organizations worldwide, specifically targeting enterprises with devastating consequences. In this in-depth guide, we will explore how LockBit operates, its various attack…
-
NewsVulnerabilities
Cleo File Transfer Vulnerability Exploited in Wild
by CSC Newsby CSC News 2 minutes readA Cleo file transfer vulnerability is causing serious concern as attackers exploit it in the wild, targeting businesses across various industries. Tracked as CVE-2024-50623, this improperly patched flaw…
-
NewsVulnerabilities
SAP Fixes Critical NetWeaver SSRF Vulnerability
by Penelope Iroko 2 minutes readSAP has addressed a major security concern by releasing patches for a critical SAP Critical NetWeaver SSRF vulnerability during its December 2024 Security Patch Day. This vulnerability, a…
-
NewsVulnerabilities
Critical OpenWrt Vulnerability Risks Malicious Firmware Updates
by Penelope Iroko 2 minutes readA newly discovered OpenWrt vulnerability risks exposing users to malicious firmware updates, putting countless embedded devices at risk. This flaw, tracked as CVE-2024-54143, affects the sysupgrade server used…