The Internet Archive has fallen victim to another cyberattack, marking the third major security incident in October 2024. On October 20, hackers successfully exploited unrotated API tokens to gain unauthorized
Uncategorized
DHS report warns violent extremists pose threat to election workers and voting process
Domestic violent extremists will pose “the most significant physical threat to government officials, voters, and elections-related personnel and infrastructure, including polling places, ballot drop box locations, voter registration sites, campaign
The Growing Threat of Cyber-Physical Convergence
What is cyber-physical convergence and why is it a growing threat? Over the past few years, threats within the cyber and physical domains have become increasingly intertwined and indistinct. ‘Cyber-physical convergence’
Cisco Investigating Cyber Security Incident, Takes DevHub Portal Offline
Cisco, has launched an investigation into a potential cyber security incident and has taken its public DevHub portal offline as a precautionary measure. On October 18, 2024, the company confirmed
ESET-Branded Wiper Attack Targets Israel; Firm Denies Compromise
Bitdefender Total Security Vulnerability Exposes Users to Man-in-the-Middle Attacks
Bitdefender Total Security has been found vulnerable to Man-in-the-Middle (MITM) attacks due to improper certificate validation in its HTTPS scanning functionality. This vulnerability, identified under multiple CVEs, poses a serious
10 Best Mobile App Security Scanners to Detect Vulnerability in Applications 2024
In this era, mobile technology and smartphone are trendy terms often used. 90% of the population holds a smartphone in their hands. Their purpose is not only to “call” other
Vulnerabilities In WebRTC Implementations Let Attackers Trigger DoS Attacks
WebRTC (Web Real-Time Communication) is an open-source project that facilitates real-time audio, video, and data sharing directly between web browsers and mobile applications without the need for plugins. Its integration
New macOS Vulnerability Allows Attackers to Bypass Security Controls
A recently discovered vulnerability in macOS, dubbed “HM Surf,” allows attackers to bypass the operating system’s Transparency, Consent, and Control (TCC) technology, gaining unauthorized access to a user’s protected data. This vulnerability, identified as CVE-2024-44133, was uncovered by Microsoft Threat Intelligence and has
Hacking Laptop With a BBQ Lighter to Gain Root Access
A simple BBQ lighter has been used to exploit vulnerabilities in laptops, gaining root access through an innovative method known as electromagnetic fault injection (EMFI). David Buchanan, a professional hardware