Blog

Home  Blog

Most widely exploited vulnerabilities in 2023 were zero days

Attackers exploited significantly more zero-day vulnerabilities against victim organizations in 2023 compared to 2022, according to a new government advisory. CISA published a joint government advisory Tuesday that detailed the topmost exploited vulnerabilities of 2023. The advisory, co-authored by agencies in the U.K., Australia, Canada and New Zealand, warned of alarming trends that further underscored […]

Explore More

An explanation of ethical hackers

In this video, TechTarget editor Jennifer English talks about ethical hackers, how they differ from typical hackers and how they can aid in protecting an organization’s data. Although the term hacker usually comes with a negative connotation, there are good hackers too. An ethical hacker is an infosec specialist who breaks into a computer system, […]

Explore More

Microsoft halts 2 zero-days on November Patch Tuesday

For November Patch Tuesday, Microsoft admins must address two Windows zero-days quickly, but enterprises that use on-premises Exchange Server should prioritize patching that platform to resolve a spoofing vulnerability. This Patch Tuesday, Microsoft released fixes for 88 new vulnerabilities with four rated critical. Of the two zero-days, one was also publicly disclosed. In total, Microsoft […]

Explore More

Immigration Police Can Already Sidestep US Sanctuary City Laws Using Data-Sharing Fusion Centers

On the campaign trail and in recent days, Donald Trump has detailed extensive plans for immigration crackdowns and mass deportations during his second term as United States president. These initiatives would, he has said, include aggressive operations in areas known as “sanctuary cities” that have laws specifically curtailing local law enforcement collaboration with US Immigration […]

Explore More

Bitfinex Hacker Gets 5 Years for $10 Billion Bitcoin Heist

In perhaps the most adorable hacker story of the year, a trio of technologists in India found an innovative way to circumvent Apple’s location restrictions on AirPod Pro 2s so they could enable the earbuds’ hearing aid feature for their grandmas. The hack involved a homemade Faraday cage, a microwave, and a lot of trial […]

Explore More

More Spyware, Fewer Rules: What Trump’s Return Means for US Cybersecurity

For American companies grousing about new cybersecurity rules, spyware firms eager to expand their global business, and hackers trying to break AI systems, Donald Trump’s second term as president will be a breath of fresh air. For nearly four years, president Joe Biden’s administration has tried to make powerful US tech firms and infrastructure operators […]

Explore More

Teen Behind Hundreds of Swatting Attacks Pleads Guilty to Federal Charges

In perhaps the largest swatting case to ever be prosecuted, an 18-year-old from Lancaster, California, has pleaded guilty to federal charges stemming from a nationwide spree of hundreds of shooting and bomb threat hoaxes that sent police scrambling to high schools, courthouses, and the homes of law enforcement officials and prominent politicians. Alan Winston Filion […]

Explore More

Let’s Work Together!
Just Drop Us a line - [email protected]

Subscribe to our Newsletter

copyright 2024 by Digital Creations LLC