Cyber Criminals Exploit Open-Source Tools to Compromise Financial Institutions Across Africa
3 min read
admin
June 26, 2025
Cybersecurity researchers are calling attention to a series of cyber attacks targeting financial organizations across Africa since...
admin
June 26, 2025
Popular messaging platform WhatsApp has added a new artificial intelligence (AI)-powered feature that leverages its in-house solution...
nOAuth Vulnerability Still Affects 9% of Microsoft Entra SaaS Apps Two Years After Discovery
3 min read
admin
June 25, 2025
New research has uncovered continued risk from a known security weakness in Microsoft's Entra ID, potentially enabling...
admin
June 25, 2025
Citrix has released security updates to address a critical flaw affecting NetScaler ADC that it said has...
admin
June 25, 2025
Cybersecurity researchers have detailed two now-patched security flaws in SAP Graphical User Interface (GUI) for Windows and...
admin
June 25, 2025
Thousands of personal records allegedly linked to athletes and visitors of the Saudi Games have been published...
admin
June 25, 2025
If you invite guest users into your Entra ID tenant, you may be opening yourself up to...
admin
June 25, 2025
Unknown threat actors have been distributing a trojanized version of SonicWall's SSL VPN NetExtender application to steal...
admin
June 25, 2025
Cybersecurity researchers have uncovered a fresh batch of malicious npm packages linked to the ongoing Contagious Interview...
admin
June 25, 2025
Microsoft on Tuesday announced that it's extending Windows 10 Extended Security Updates (ESU) for an extra year...
admin
June 24, 2025
The United States Embassy in India has announced that applicants for F, M, and J nonimmigrant visas...
admin
June 24, 2025
I had the honor of hosting the first episode of the Xposure Podcast live from Xposure Summit...
admin
June 24, 2025
Cybersecurity researchers have detailed two novel methods that can be used to disrupt cryptocurrency mining botnets.
The methods...
admin
June 24, 2025
Unidentified threat actors have been observed targeting publicly exposed Microsoft Exchange servers to inject malicious code into...
admin
June 24, 2025
Misconfigured Docker instances are the target of a campaign that employs the Tor anonymity network to stealthily...
admin
June 24, 2025
The U.S. House of Representatives has formally banned congressional staff members from using WhatsApp on government-issued devices,...
admin
June 24, 2025
The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of a new cyber attack campaign by...
China-linked Salt Typhoon Exploits Critical Cisco Vulnerability to Target Canadian Telecom
2 min read
admin
June 24, 2025
The Canadian Centre for Cyber Security and the U.S. Federal Bureau of Investigation (FBI) have issued an...
admin
June 23, 2025
It sure is a hard time to be a SOC analyst.
Every day, they are expected to...
Echo Chamber Jailbreak Tricks LLMs Like OpenAI and Google into Generating Harmful Content
3 min read
admin
June 23, 2025
Cybersecurity researchers are calling attention to a new jailbreaking method called Echo Chamber that could be leveraged...
