NTLM Vulnerability

How to Protect Your Environment from the NTLM Vulnerability

Join our weekly newsletters for the latest updates and exclusive content on industry-leading AI, InfoSec, Technology, Psychology, and Literature coverage. Learn More Introduction A newly discovered NTLM vulnerability has exposed a critical weakness in Microsoft’s outdated authentication protocol, enabling attackers to steal credentials by having users merely view a malicious file in Windows Explorer. With…

Rostislav Panev, a key developer behind the LockBit ransomware operation

LockBit Ransomware Developer Arrested: The Case of Rostislav Panev

Join our weekly newsletters for the latest updates and exclusive content on industry-leading AI, InfoSec, Technology, Psychology, and Literature coverage. Learn More Introduction In a significant breakthrough against ransomware operations, US law enforcement has revealed the arrest of Rostislav Panev, a dual Russian-Israeli national and a lead developer of the LockBit ransomware-as-a-service (RaaS) group. The…

IntelBroker leaks 2.9 TB of exposed Cisco records
| | |

IntelBroker Leaks 2.9 TB of Exposed Cisco Records: What You Need to Know

Join our weekly newsletters for the latest updates and exclusive content on industry-leading AI, InfoSec, Technology, Psychology, and Literature coverage. Learn More Introduction On December 17, 2024, the notorious hacker IntelBroker released 2.9 TB of sensitive data allegedly stolen from a Cisco developer resource. This is part of a claimed 4.5 TB dataset linked to…

Managing Threats When Most of the Security Team Is Out of the Office.

Effective Strategies for Managing Threats with a Lean Security Team

Join our weekly newsletters for the latest updates and exclusive content on industry-leading AI, InfoSec, Technology, Psychology, and Literature coverage. Learn More Introduction During holidays and slow weeks, cybersecurity threats don’t take a break. In fact, attackers often exploit these lulls, knowing that organizations are operating with skeleton crews. The lack of experienced staff, delayed…

US could be set to ban TP-Link routers
|

Is the US Set to Ban TP-Link Routers? What You Need to Know

Join our weekly newsletters for the latest updates and exclusive content on industry-leading AI, InfoSec, Technology, Psychology, and Literature coverage. Learn More Introduction The US government may soon prohibit the sale of TP-Link routers, marking one of the largest actions against Chinese telecom equipment since the 2019 Huawei ban. According to a report from the…

2024 Roundup Top Data Breach Stories

2024 Roundup: Top Data Breach Stories and Industry Trends

Join our weekly newsletters for the latest updates and exclusive content on industry-leading AI, InfoSec, Technology, Psychology, and Literature coverage. Learn More Introduction As 2025 approaches, it’s crucial to reflect on the major cybersecurity developments and challenges of 2024. While advancements in technology and awareness have fortified defenses, this year also served as a stark…

Thousands Download Malicious npm Libraries

The Rising Threat of Malicious npm Libraries: A Cautionary Tale

Join our weekly newsletters for the latest updates and exclusive content on industry-leading AI, InfoSec, Technology, Psychology, and Literature coverage. Learn More Introduction Open-source platforms like npm are invaluable resources for developers, but their accessibility also makes them prime targets for malicious actors. Recently, Sonatype identified typosquatting attacks on npm libraries, including @typescript_eslinter/eslint and types-node,…

Juniper Networks Warns of Mirai Botnet
| | | | |

Juniper Warns of Mirai Botnet Targeting SSR Devices with Default Passwords

Join our weekly newsletters for the latest updates and exclusive content on industry-leading AI, InfoSec, Technology, Psychology, and Literature coverage. Learn More Introduction Juniper Networks has issued a stark warning about the exploitation of Session Smart Router (SSR) products with default passwords in a malicious campaign deploying the notorious Mirai botnet malware. This development highlights…

EU Opens Door for AI Training Using Personal Data
|

EU Opens Door for AI Training Using Personal Data

Join our weekly newsletters for the latest updates and exclusive content on industry-leading AI, InfoSec, Technology, Psychology, and Literature coverage. Learn More Introduction The European Union has taken a significant step toward reconciling artificial intelligence (AI) innovation with privacy regulations. In a landmark opinion published on December 18, the European Data Protection Board (EDPB) clarified…

'The Rise of Crypto-Hackers_ How North Koreans
| | |

The Rise of Crypto-Hackers: How North Koreans Steal $2.2 Billion

Join our weekly newsletters for the latest updates and exclusive content on industry-leading AI, InfoSec, Technology, Psychology, and Literature coverage. Learn More Introduction Cryptocurrency platforms faced an unprecedented wave of cyberattacks in 2024, culminating in a staggering $2.2 billion in stolen assets, according to blockchain analytics firm Chainalysis. North Korean hackers dominated the scene, accounting…