AI DevwWrld Chatbot Summit CYSEC Global Cyber Security & Cloud Expo World Series Digital Identity & Authentication Summit Middle East Low Code No Code Summit TimeAI Summit

Cyber ​​incidents

Digital sabotage on pakistani soil: analysis of a sophisticated cyber attackIn-depth looks at the Pakistan cyber attackThe article reports a sophisticated cyber attack against important entities in Pakistan, carried out via spear phishing and thanks to an unprecedented malware. This malicious software stole sensitive data, causing severe data security and operational impact. The organizations involved are implementing...

The emergence of serious vulnerabilities in Adobe ColdFusion softwareUnder attack: how Adobe's software flaws put companies' IT security at riskThe article talks about the serious vulnerabilities discovered in Adobe ColdFusion software, which can be exploited to conduct cyber attacks. Emphasize the importance of installing the security patches released by Adobe to address these issues, to reduce the risk of attacks. Indicates the need for proactive...

Microsoft security in danger: leaked encryption keys and government interventionCybersecurity highlights: the Microsoft encryption key incident and its repercussionsMicrosoft lost access to its product encryption keys, leaving user data security vulnerable. This has raised concerns about potential government intervention. Cyber security experts work to fix the problem, aiming to strengthen future security measures.

The hidden fire: Docker Hub images reveal private keys and authentication secretsSecurity issues using Docker Hub: an unexpected risk for companiesThe article highlights an issue related to computer security. In the Docker Hub, a Docker image hosting service, sensitive data leaks (authentication secrets and private keys) have been detected due to careless practices. This situation can lead to cyber attacks harmful to companies and customers. To...

Cybersecurity overview: attacks, vulnerabilities and future challengesAttacks through Microsoft Teams, law firm under siege by hackers, the highly anticipated release of CVSS 4.0 and the complex future challenge of cyber securityThe article discusses various topics related to cyber security. It includes a recent malware attack via Microsoft Teams, cyberattacks on law firms, the upcoming release of the new vulnerability scoring system (CVSS 4.0), and future cybersecurity challenges.

Vulnerability of the AIOSEO plugin: over a million WordPress sites at riskFrom SEO to SOV: how a trick can turn into a cybersecurity threatThe article talks about a vulnerability discovered in the WordPress plugin "All in One SEO Pack", which recorded passwords in clear text, exposing users to possible hacker attacks. AIOSEO fixed the issue with an update, but the issue underscores the importance of keeping plugins up-to-date and robust...

Security camera malfunctions: a threat to privacyVulnerability of video surveillance systems: privacy at risk and responsibility of manufacturersSecurity cameras manufactured by the Chinese Hikvision malfunctioned, allowing unauthorized access to the recordings. Hikvision's belated response raises questions about the company's ability to protect data. The violation of privacy, especially of minors, is under the attention of the Guarantor Authority...

Municipality of Ferrara victim of Rhysida ransomwareCybersecurity under siege: the italian Municipality resists the incursionThe Municipality of Ferrara has been the victim of a cyber attack orchestrated using Rhysida ransomware, a dangerous encrypting malware. The damage seems contained thanks to the protection systems, but the investigation is still ongoing. Mayor Fabbri shows determination, rejecting the threats and proposing...

Shimizu Port ransomware attack: a lesson in cyber resilienceAnalysis and implications of the cyber attack on the Japanese strategic nodeThe article chronicles a recent ransomware attack on the Japanese port of Shimizu, which is causing significant disruption in its operations and hurting the local economy. The act highlights the importance of critical infrastructure resilience to cyber threats and the need to invest in advanced security,...

Chinese hackers infiltrate email accounts of several organizations, claims MicrosoftStorm-0558 cyber-espionage culprits: tracking the tactics and repercussionsMicrosoft alleges that a chinese cyber-espionage group, Storm-0558, hacked around 25 organizations' email accounts, including some government agencies. The White House confirms the breach of Microsoft's cloud security, where the hackers used a vulnerability in Azure to forge authentication tokens and...