Firewall daily
Read the latest cybersecurity news, briefs, and in-depth analysis.
-
Doxxing On BreachForums: Moderator’s Info Leaked?
Anonymous threat actor claims to have exposed moderator's identity including his age, residential address and phone number. by Krishna Murthy…
-
NCB Buenos Aires Faces Alleged XSS And CSRF Vulnerabilities
The disclosure has raised concerns within the governmental and law enforcement sectors, affecting not only Interpol but also Argentina's broader…
-
WordPress Supply Chain Attack: Plugins Compromised By Malware
The injected malware's primary function involves attempting to create unauthorized administrative user accounts on affected websites. by Ashish Khaitan June…
-
CDK Global Cyberattack Becomes A Supply Chain Attack For Dealers
The attack that hit last week has impacted operations of major players such as Asbury Automotive Group, AutoNation, Group 1…
-
Apple Vision Pro ‘Bug’ Can Be Exploited To Generate 3D Objects
Researcher dubs exploit of CVE-2024-27812 as world's first 'spatial hack.' by Alan J June 24th, 2024 Share on LinkedInShare on…
-
TCE Exclusive: Zakir Hussain On Building Strong Relationships In Cybersecurity – The Cyber Express
In this interview with The Cyber Express, Rangwala shares pivotal insights on cybersecurity dynamics, leadership strategies, and the future of…
-
200 Government Agencies In Indonesia Disrupted By Cyberattack
Investigators have detected samples of the LockBit 3.0 ransomware variant in the campaign, with attackers demanding $8 million in ransom.…
-
Coinstats Data Breach: 1,590 Wallets Compromised By Hackers
The affected wallets, constituting about 1.3% of all Coinstats wallets, were primarily those created directly within the app. by Ashish…
-
IntelBroker Hacker Claims Massive Lindex Group Data Breach
IntelBroker claims Lindex Group's compromised source code is accessible through undisclosed channels, withholding specific access details. by Ashish Khaitan June…
-
Vulnerability Report: Critical Flaws In Microsoft, VMware, Veeam, ASUS
Cyble threat researchers identified more than 2 million assets exposed to the week’s top vulnerabilities. by Paul Shread June 24th,…
-
Jollibee Probes Alleged Data Breach
The Jollibee probe began after a threat actor claimed responsibility for breaching the systems of Jollibee Foods Corporation. by Krishna…
-
Notorious Handala Hacker Group Claims Zerto Cyberattack
The cyberattack on Zerto marks another chapter in Handala's campaign, aligning their actions with broader movements supporting Palestinian rights globally.…
-
TCE Exclusive: Yana Li Journey From Adversity To Excellence
For those embarking on similar paths, Yana's story offers guidance, encouragement, and a steadfast belief in the limitless possibilities within…
-
TCE Cyberwatch: Your Weekly Guide To Cybersecurity News
TCE Cyberwatch is here to provide you with a comprehensive weekly roundup of the most significant cybersecurity news, trends, and…
-
Binance Freezes $5.3M In Funds From BtcTurk Cyberattack
BtcTurk reassured its users in a statement on its website and denoted that most assets stored in cold wallets remained…
-
ECU Worldwide Appoints Rajneesh Garg As New CIO
Garg's collaboration with the Allcargo Group leadership aims to bring technological advancements and improvements to ECU Worldwide's services and operations.…
-
CHC Cyberattack: Check Your Mail In July For Data Breach Notice
As the investigation progresses, affected individuals are urged to stay vigilant and utilize the resources provided to mitigate potential risks.…
-
Empowering Women In Cybersecurity: Insights From Irene Corpuz
Irene highlights the importance of a supportive community, which acts as a backbone for women in cybersecurity, helping them navigate…
-
ANY.RUN Malware Sandbox Provider’s Employee Email Compromised – The Cyber Express
Incident occurred after a customer's email account had been compromised and a phishing lure was sent to an employee. by…
-
Sellafield Nuclear Dump Guilty Of Cybersecurity Failings
Concerns over the nuclear site's cyber defenses have existed for well over a decade, with a prominent trade union expressing…
-
After Banning Kaspersky Product Sales, U.S. Sanctions Execs
Kaspersky says decision based on geopolitical climate and theoretical concerns, rather than on a comprehensive evaluation of the integrity of…
-
Decoding Rafel RAT: Android Espionage And Ransomware Impact
Approximately 120 malicious campaigns linked to Rafel RAT have successfully targeted global organizations. by Ashish Khaitan June 21st, 2024 Share…
-
CDK Global Hit By Second Cyberattack
The incident has forced CDK Global to shut down its systems as a preventive measure, extending initial outage. by Alan…
-
Jollibee Cyberattack: Hacker Claims Access To Sensitive Data
Customer information, food orders potentially exposed by threat actor who was also responsible for Snowflake breach. by Krishna Murthy June…
-
Hacker Release 1M Customer Records From Ticketmaster Data Breach
This move appears to be an attempt to pressure Ticketmaster into meeting their demands, underlining the severity of the breach…
-
2022 Optus Data Breach Could Have Been Averted 4 Years Ago
Optus cyberattack was not highly sophisticated or one that required advanced skills, the ACMA’s investigation revealed. It was merely an…
-
Enhancing SSO Adoption In SMBs: Challenges And Solutions
SSO streamlines access by authenticating users once for multiple applications, bolstering organizational security. by Ashish Khaitan June 21st, 2024 Share…
-
US Banning Kaspersky: Timeline Of A Cybersecurity Showdown
The determination reflects years of scrutiny and marks a significant escalation in U.S. efforts to protect its cyber infrastructure. This…
-
UEFIcanhazbufferoverflow Vulnerability Impacts Intel CPUs
The vulnerable Phoenix SecureCore UEFI firmware spans various Intel Core processor generations: AlderLake, CoffeeLake, CometLake, IceLake, and others. by Ashish…
-
Weekly Vulnerability Report: Critical Security Flaws In GitHub, FortiOS, And PHP
These vulnerabilities, highlighted from June 05, 2024, to June 11, 2024, include critical issues that could be easily exploited. by…