IntelBroker leaks 2.9 TB of exposed Cisco records
| | |

IntelBroker Leaks 2.9 TB of Exposed Cisco Records: What You Need to Know

Join our weekly newsletters for the latest updates and exclusive content on industry-leading AI, InfoSec, Technology, Psychology, and Literature coverage. Learn More Introduction On December 17, 2024, the notorious hacker IntelBroker released 2.9 TB of sensitive data allegedly stolen from a Cisco developer resource. This is part of a claimed 4.5 TB dataset linked to…

Juniper Networks Warns of Mirai Botnet
| | | | |

Juniper Warns of Mirai Botnet Targeting SSR Devices with Default Passwords

Join our weekly newsletters for the latest updates and exclusive content on industry-leading AI, InfoSec, Technology, Psychology, and Literature coverage. Learn More Introduction Juniper Networks has issued a stark warning about the exploitation of Session Smart Router (SSR) products with default passwords in a malicious campaign deploying the notorious Mirai botnet malware. This development highlights…

Europes-Cyber-Resilience-Act
| | |

Europe’s Cyber Resilience Act: A New Era for Digital Security

Join our weekly newsletters for the latest updates and exclusive content on industry-leading AI, InfoSec, Technology, Psychology, and Literature coverage. Learn More Introduction The Cyber Resilience Act (CRA), set to take effect in December 2027, represents a groundbreaking step in Europe’s digital security landscape. For the first time, the EU has enacted legislation mandating strict…

'OT_ICS Engineering Workstations Face Barrage of Fresh Malware
| | |

Protecting OT/ICS Engineering Workstations from Emerging Malware Threats

Join our weekly newsletters for the latest updates and exclusive content on industry-leading AI, InfoSec, Technology, Psychology, and Literature coverage. Learn More Introduction Operational Technology (OT) and Industrial Control Systems (ICS) are vital to industries like manufacturing, energy, and transportation. However, these systems are facing a growing wave of cyber threats, particularly through engineering workstations….

Fortinet Tackles Unpatched Critical RCE Vectors
| | |

How Fortinet Tackles Unpatched Critical RCE Vectors

Join our weekly newsletters for the latest updates and exclusive content on industry-leading AI, InfoSec, Technology, Psychology, and Literature coverage. Learn More Introduction Fortinet has released critical patches for a vulnerability in its Wireless LAN Manager (FortiWLM) that could allow attackers to exploit unauthenticated sensitive information disclosure and enable remote code execution (RCE). The flaw,…

industry threat actors
| |

Top 10 Industries Targeted by Threat Actors in 2024

Join our weekly newsletters for the latest updates and exclusive content on industry-leading AI, InfoSec, Technology, Psychology, and Literature coverage. Learn More Introduction Cyberattacks have become a growing menace across various industries, with 2024 witnessing a sharp escalation in their frequency and complexity. Threat actors now target sectors integral to society, leveraging advanced techniques like…

MacBook Pro turned-on
|

Ransomware Surge: Analyzing Akira and Ransomhub’s Role in Record High Claims

Join our weekly newsletters for the latest updates and exclusive content on industry-leading AI, InfoSec, Technology, Psychology, and Literature coverage. Learn More Overview of Ransomware Claims in 2024 The landscape of ransomware claims has witnessed a notable surge in 2024, as highlighted by data from Corvus Insurance. This year has been particularly alarming for organizations…

green padlock on pink surface
| | | | | | | | |

Seclists on Github: The Essential Toolkit for Security Testers

Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI, InfoSec coverage. Learn More Introduction to Seclists Seclists serves as a crucial resource within the realm of security testing, offering a comprehensive collection of various lists that support a multitude of security-related assessments. Designed specifically for infosec professionals, Seclists…

man sitting in front of control panel
| | | | | | |

Understanding Command and Control (C2) Infrastructure: The Backbone of Cyber Attacks

What is Command and Control (C2) Infrastructure? Command and control (C2) infrastructure refers to the systems and protocols that cybercriminals use to communicate with compromised machines, often referred to as “bots” or “zombies.” C2 plays a pivotal role in orchestrating cyber attacks by allowing attackers to issue commands, receive data, and manage operations from a…