The maneuver of Chinese cyber attackers aims to destroy critical infrastructure of the United States

The US Cybersecurity and Infrastructure Security Agency (CISA) has released a report detailing how the Chinese-backed Volt Typhoon advanced persistent threat (APT) is constantly targeting highly sensitive critical infrastructurewith new…

Chinese hackers exploited the FortiGate flaw to breach the Dutch military network

07 February 2024PressroomCyber ​​espionage/network security State-backed Chinese hackers have broken into a computer network used by the Dutch military by targeting Fortinet FortiGate devices. “This [computer network] was used for…

Fulton County’s court system is still hampered by cyberattacks

After Fulton County, Georgia, suffered a cyber attack and the subsequent power outage in late January, which led to malfunctions in court records, tax processing, and the court system’s website,…

Global coalition and tech giants unite against commercial spyware abuse

A coalition of dozens of countries, including France, the United Kingdom and the United States, along with technology companies such as Google, MDSec, Meta and Microsoft, have signed a joint…

Critical TeamCity bug allows server takeover

JetBrains has patched a critical security vulnerability in its TeamCity On-Premises server that could allow unauthenticated, remote attackers to gain control over an affected server and use it to execute…

Critical bootloader vulnerability in Shim impacts almost all Linux distributions

07 February 2024PressroomDevice security/vulnerability Shim maintainers have released version 15.8 to address six security flaws, including a critical bug that could pave the way for remote code execution under specific…

UAE banks conduct cyber warfare gaming exercises

Banks in the United Arab Emirates (UAE) recently participated in a simulated cyber attack event that tested their ability to counter cyber risks and identified their strengths and weaknesses. The…

After the removal of the FBI, the KV-Botnet operators change tactics in an attempt to recover

The threat actors behind the Botnet KV they made “behavioral modifications” to the malicious network as U.S. law enforcement began issuing commands to neutralize the activity. KV-botnet is the name…

As smart cities expand, so do the threats

For technologists, building smart cities is not an ambitious goal, but a necessity. The World Bank estimates that by 2050, 70% of the world’s population will live in urban areas,…

5 Steps to vCISO Success for MSPs and MSSPs

07 February 2024News about hackersRisk management/cyber security 2024 will be the year of the vCISO. A staggering 45% of MSPs and MSSPs plan to begin offering vCISO services in 2024.…