Researchers from the Technical University of Berlin have developed a method to jailbreak the AMD-based infotainment systems used in all recent Tesla car models and make...
PaperCut recently fixed a critical security vulnerability in its NG/MF print management software that allows unauthenticated attackers to gain remote code execution on unpatched Windows servers....
Microsoft fixed a security flaw in the Power Platform Custom Connectors feature that let unauthenticated attackers access cross-tenant applications and Azure customers’ sensitive data after being called...
Using fake certificates, attackers gain unauthorized access to corporate network resources. Attackers use such certificates to trick the Key Distribution Center (KDC) to get into the target company’s...
According to reports, the threat group known as “Nobelium” who were responsible for the SolarWinds attacks is now discovered to be targeting Microsoft tenants through the new Cross-Tenant...
The Threat and Vulnerability Roundup for this week is out! With great pride, Cyber Writes presents a weekly overview of the most recent cybersecurity news. We...
As per reports, a new version of the Rilide stealer is known to be stealing credentials from enterprise employees and crypto wallets. This new version is...
The four-year implementation plan stresses development, recruitment, and retention to fill needed cyber positions. Nearly a quarter of the Pentagon’s cyber jobs are unfilled, but the...
The Cybersecurity and Infrastructure Security Agency’s 2024-2026 cybersecurity roadmap focuses on public-private partnerships and using metrics to gauge the effectiveness of cybersecurity measures. The Cybersecurity and...
In collaboration with CISA, the NSA, and the FBI, Five Eyes cybersecurity authorities have issued today a list of the 12 most exploited vulnerabilities throughout 2022....