Tag - phishing security awareness training for army

How the Java Vulnerabilities Affect Cyber Security Levels?

How the Java Vulnerabilities Affect Cyber Security Levels?

There are many software in Java software supply chains that are vulnerable to the Log4j bug, and administrators and security experts probably don’t even know where to look. About 17,000 Java packages in the central Maven repository, the most important collection of Java packages available to developers, are vulnerable [...]

Read more...
Why are Nation State Attacks Increasing?

Why are Nation State Attacks Increasing?

A macroeconomic trend shook the world in the past years. Attackers no longer care about getting caught. There is an increase in the number of nation-state attacks. The attack tactics are intended for potential future uses such as covert opportunistic attacks. So, we see that much has changed. But [...]

Read more...
Health System Attack Affecting One Million People

Health System Attack Affecting One Million People

A major cyberattack has shaken the cybersecurity industry in recent days. Florida-based health firm Broward Health, which operates in more than 30 locations, announced that they were the victims of a serious attack. Due to the attack, more than a million people suffered a major data breach. So how did [...]

Read more...
Vulnerabilities of WordPress Plugins Raise Concern

Vulnerabilities of WordPress Plugins Raise Concern

The famous WordPress SEO plugin called All in One SEO has caused a lot of damage recently. Apparently, this plugin makes it easy to hijack sites that already have other vulnerabilities. More than 3 million websites use this plugin, which may cause more damage if it continues like this. [...]

Read more...
Hackers Use Domain Name Registration In Their Attacks

Hackers Use Domain Name Registration In Their Attacks

Experts have been spending most of their time lately searching for large-scale bot campaigns. As a result of these efforts, they recently discovered a new type of attack. Accordingly, hackers use domain parking services to register multiple domains and try to make money in this way. According to experts, [...]

Read more...
Millions of Credentials Have Been Leaked

Millions of Credentials Have Been Leaked

According to security experts in the UK, there are approximately 586 million credentials in a compromised cloud storage. Any hacker who gains access to this resource can download the user information free of charge. So, millions of credentials have been leaked. But how? The origin of the credentials and [...]

Read more...
Microsoft Azure's Four-Year Old Vulnerability Revealed

Microsoft Azure’s Four-Year Old Vulnerability Revealed

According to the researchers, the Microsoft Azure application service has a four-year vulnerability that can expose the source code of web applications written in PHP, Python, Ruby, or Node, distributed by Local Git. The analysis said that the vulnerability was almost certainly a zero-day attack. The company called the [...]

Read more...