Twitter Mentions More Effective Than CVSS at Reducing Exploitability
Twitter Mentions More Effective Than CVSS at Reducing Exploitability Monitoring Twitter mentions of vulnerabilities may be twice as effective as CVSS scores at helping organizations...
Eleven Arrested in Bust of Prolific Nigerian BEC Gang
Eleven Arrested in Bust of Prolific Nigerian BEC Gang Nigerian police have arrested 11 more suspected members of a prolific business email compromise (BEC) gang that...
Red Cross: Supply Chain Data Breach Hit 500K People
Red Cross: Supply Chain Data Breach Hit 500K People The International Committee of the Red Cross (ICRC) has revealed a major data breach that compromised the...
BadUSB explained: How rogue USBs threaten your organization
In January 2022, the FBI issued a public warning over a USB attack campaign in which numerous USB drives, laced with malicious software, were sent...
What CISOs can learn about insider threats from Iran’s human espionage tactics
Over the last few months, there has been an uptick of espionage revelations concerning Iran and its interest in collecting information against regional adversaries as...
INTERPOL and Nigerian Police bust business email compromise ring, arrest 11
INTERPOL and the Nigerian Federal Police today announced the arrests of 11 business email compromise (BEC) actors in Nigeria as part of an international operation...
Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution
Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Google Chrome is a web browser...
Researchers Hack Olympic Games App
Researchers Hack Olympic Games App Cybersecurity researchers in Canada have found a “devastating flaw” in the MY2022 app, designed for use by attendees of this year’s Winter...
Ransomware Attack on Moncler
Ransomware Attack on Moncler Cyber-criminals have stolen data from Italian luxury fashion brand Moncler and published it on the dark web. The maker of down jackets confirmed Tuesday that...
Drupal core – Moderately critical – Cross site scripting – SA-CORE-2022-002
Project: Drupal core Date: 2022-January-19 Security risk: Moderately critical 14∕25 AC:Basic/A:User/CI:Some/II:Some/E:Proof/TD:Default Vulnerability: Cross site scripting Description: jQuery UI is a third-party library used by Drupal....