The Cuba ransomware gang was observed in attacks targeting critical infrastructure organizations in the United States and IT firms in Latin America, using a combination of...
This year’s Hack-A-Sat competition challenged teams to hack into an actual satellite in orbit. The US Air Force Moonlighter, which was launched especially for the event, was the...
Welcome to Cyber Writes’ weekly Threat and Vulnerability Roundup, where we provide the most recent information on cybersecurity news. Take advantage of our extensive coverage and...
Privileged users typically hold crucial positions within organizations. They usually have elevated access, authority, and permission levels in the organization’s IT systems, networks, applications, and critical...
Lax policies for package naming on Microsoft’s PowerShell Gallery code repository allow threat actors to perform typosquatting attacks, spoof popular packages and potentially lay the ground...
Hackers claim to have breached the network of a major auction house and offered access to whoever was willing to pay $120,000. Security researchers found the...
An international law enforcement operation led by Interpol has led to the arrest of 14 suspected cybercriminals in an operation codenamed ‘Africa Cyber Surge II,’ launched...
A high-severity vulnerability has been fixed in WinRAR, the popular file archiver utility for Windows used by millions, that can execute commands on a computer simply...
Threat actors are known to use several methods to lure victims into their websites and make them download their malicious payload, which will allow them to...
Cynomi, the leading AI-powered virtual Chief Information Security Officer (vCISO) platform vendor for Managed Service Providers (MSPs), Managed Security Service Providers (MSSPs) and consulting firms, has...