How to Eliminate Identity-Based Threats
Despite significant investments in advanced technologies and employee training programs, credential and…
Hackers Exploit Zero-Day in cnPilot Routers to Deploy AIRASHI DDoS Botnet
Threat actors are exploiting an unspecified zero-day vulnerability in Cambium Networks cnPilot…
Trump Terminates DHS Advisory Committee Memberships, Disrupting Cybersecurity Review
Jan 22, 2025Ravie LakshmananCybersecurity / National Security The new Trump administration has…
PlushDaemon APT Targets South Korean VPN Provider in Supply Chain Attack
A previously undocumented China-aligned advanced persistent threat (APT) group named PlushDaemon has…
13,000 MikroTik Routers Hijacked by Botnet for Malspam and Cyberattacks
Jan 21, 2025Ravie LakshmananEmail Security / Botnet A global network of about…
Mirai Variant Murdoc_Botnet Exploits AVTECH IP Cameras and Huawei Routers
Jan 21, 2025Ravie LakshmananBotnet / Vulnerability Cybersecurity researchers have warned of a…
CERT-UA Warns of Cyber Scams Using Fake AnyDesk Requests for Fraudulent Security Audits
Jan 21, 2025Ravie LakshmananMalware / Cyber Threat The Computer Emergency Response Team…
Unsecured Tunneling Protocols Expose 4.2 Million Hosts, Including VPNs and Routers
Jan 20, 2025Ravie LakshmananNetwork Security / Vulnerability New research has uncovered security…
European Privacy Group Sues TikTok and AliExpress for Illicit Data Transfers to China
Austrian privacy non-profit None of Your Business (noyb) has filed complaints accusing…