BeanVPN leaks 25 million user records
The cache of 18.5GB connection logs allegedly contained more than 25 million records Read More
SAP Patches Critical NetWeaver and ABAP Platform Vulnerabilities
SAP confirmed most of the vulnerabilities have now available fixes, and advised companies to update their systems as soon as possible. Read More
New peer-to-peer botnet Panchan hijacks Linux servers
Researchers warn of a new worm that's infecting Linux servers by brute-forcing and stealing SSH credentials. The hijacked servers are joined in a botnet and...
US Researchers Spot New Hertzbleed Flaw Affecting AMD and Intel CPUs
New side-channel attacks reportedly use frequency side channels to extract cryptographic keys Read More
USN-5479-1: PHP vulnerabilities
Charles Fol discovered that PHP incorrectly handled initializing certain arrays when handling the pg_query_params function. A remote attacker could use this issue to cause PHP...
M1 Chip Vulnerability
This is a new vulnerability against Apple’s M1 chip. Researchers say that it is unpatchable. Researchers from MIT’s Computer Science and Artificial Intelligence Laboratory, however,...
DDoS-for-hire service which bombarded websites with attacks earns man two years in prison
The US authorities have sentenced a man to 24 months in a federal prison after he was found to have run a DDoS-for-hire service that...
Can global recruitment solve the cybersecurity hiring problem?
This blog was written by an independent guest blogger. It’s well known that there’s a pervasive cybersecurity skills shortage. The problem has multiple ramifications. Current...
BNPL Fraud Alert as Account Takeovers Surge
Buy now, pay later services represent an increasingly attractive target Read More
How to mitigate Active Directory attacks that use the KrbRelayUp toolset
Those of you with on-premises Active Directory (AD) need to be aware of a new way to abuse Kerberos in your network. KrbRelayUp is a...