Cybersecurity Blog
Hackers Target Selenium Grid Servers for Proxyjacking and Cryptomining Attacks
Threat actors are infecting publicly exposed Selenium Grid servers to utilize victims’ internet bandwidth for ...
Windows Vulnerability Abused Braille “Spaces” in Zero-Day Attacks
A recently patched Windows vulnerability, identified as CVE-2024-43461, was exploited by the Void Banshee APT hacking ...
Cybercriminals Exploit HTTP Headers for Credential Theft via Large-Scale Phishing Attacks
Cybersecurity researchers have identified ongoing phishing campaigns that exploit refresh entries in HTTP headers to ...
Cyber Threats Intensify in Mexico; Espionage and Extortion Risks Grow
Mandiant’s report highlights the escalating cyber threats facing Mexico, with a rise in global espionage and local ...
Applications are Open for IoT Device Cyber Certifiers
The FCC is seeking volunteers to serve as administrators for a new cybersecurity labeling program, allowing consumers to ...
Aembit Raises $25M to Tackle Nonhuman Identity Security Challenges
Nonhuman identity and access management company Aembit Inc. has secured $25 million in funding to enhance its solutions. ...
Irish Data Protection Regulator to Investigate Google AI
Ireland’s data protection authorities are investigating Google’s AI model to ensure compliance with GDPR. ...
Python Libraries Exploited for Malicious Intent
A recent report by Xavier Mertens, a Senior ISC Handler and cybersecurity consultant, highlights a concerning trend ...