Cybersecurity Blog
Firefox, Chrome Updates Patch High-Severity Vulnerabilities
Mozilla and Google this week announced software updates for Firefox and Chrome that address multiple high-severity ...
iLeakage: New Safari Exploit Impacts Apple iPhones and Macs with A and M-Series CPUs
Oct 26, 2023NewsroomData Security / Vulnerability A group of academics has devised a novel side-channel attack dubbed ...
New iLeakage Attack Steals Emails, Passwords From Apple Safari
This attack bypasses standard side-channel protections implemented by browser vendors and can retrieve data from Safari, ...
Australia Focuses on Threat of Chinese Attack on Solar Power
Critical Infrastructure Security , Cyberwarfare / Nation-State Attacks , Fraud Management & Cybercrime New Standards ...
9 vulnerabilities found in VPN software, including 1 critical issue that could lead to remote code execution
Cisco Talos has disclosed 17 vulnerabilities over the past two weeks, including nine that exist in a popular VPN ...
The Rise and Tactics of Octo Tempest: A Cyber Threat Analysis | Cyware Hacker News
Microsoft has been closely monitoring the activities of a threat group known as Octo Tempest. This group has emerged as ...
Citrix Bleed Exploit Lets Hackers Hijack Netscaler Accounts
The vulnerability arises from an unauthenticated buffer-related flaw in Citrix devices, which can be exploited to gain ...
UK Parliament Opens Inquiry into Cyber-Resilience
UK lawmakers have launched an inquiry into the cyber-resilience of critical national infrastructure (CNI), claiming the ...