+44 (0)203 88 020 88

Menu

Search

cyber security news

How EagerBee is Redefining Cyber Espionage in the Middle East

In early January 2025, cybersecurity researchers uncovered a sophisticated cyber espionage campaign targeting Internet Service Providers (ISPs) and government entities in the Middle East. At the centre of this campaign lies an advanced malware framework known as EagerBee, which has been significantly upgraded with new capabilities to facilitate stealthy and persistent access to compromised systems. […]

How EagerBee is Redefining Cyber Espionage in the Middle East Read More »

FunkSec: The Emergence of AI-Driven Ransomware Threats

In late 2024, a new ransomware group known as FunkSec emerged, leveraging artificial intelligence (AI) to enhance their cybercriminal activities. By January 2025, they had targeted over 85 organisations worldwide, employing sophisticated tactics that blend AI capabilities with traditional ransomware methods. Understanding FunkSec’s Modus Operandi FunkSec employs a double extortion strategy, which involves both encrypting

FunkSec: The Emergence of AI-Driven Ransomware Threats Read More »

Nation-State Attackers Exploiting Critical Infrastructure: A Growing Threat

Nation-state cyberattacks on critical infrastructure are becoming increasingly sophisticated and destructive, as highlighted by recent reports. In October 2024, attackers began exploiting vulnerabilities in Ivanti software used by critical sectors, including energy and transportation. These vulnerabilities allowed cyber actors to gain unauthorised access, move laterally within networks, and execute persistent attacks, sometimes even “patching” exploited

Nation-State Attackers Exploiting Critical Infrastructure: A Growing Threat Read More »

Apple Patches VoiceOver Bug That Could Read Passwords Aloud

Apple has recently addressed a significant vulnerability in its VoiceOver feature that raised privacy concerns for iPhone and iPad users. The flaw, identified as CVE-2024-44204, allowed the VoiceOver accessibility tool to read saved passwords out loud, a critical issue for users relying on this feature to navigate their devices without visual input. The bug was

Apple Patches VoiceOver Bug That Could Read Passwords Aloud Read More »

NVIDIA Vulnerability CVE-2024-0132: A Deep Dive into the Threat and Mitigation

In September 2024, NVIDIA disclosed a critical security flaw, CVE-2024-0132, affecting its NVIDIA Container Toolkit. This vulnerability has sent shockwaves through the IT and cybersecurity communities due to its severity and potential to compromise container environments. The flaw, which has been assigned a CVSS score of 9.0 out of 10, underscores the ever-present risks of

NVIDIA Vulnerability CVE-2024-0132: A Deep Dive into the Threat and Mitigation Read More »

Meta Fined €91 Million for Failing to Properly Protect User Passwords

Meta, the parent company of Facebook and Instagram, has been hit with a significant €91 million (£79 million) fine by Ireland’s Data Protection Commission (DPC) after an investigation revealed serious lapses in the company’s handling of user data. The fine stems from Meta’s failure to properly encrypt millions of user passwords, which were stored in

Meta Fined €91 Million for Failing to Properly Protect User Passwords Read More »

WinRAR Remote Code Execution Flaw Patched

A high severity vulnerability has been found in RARLAB’s popular Windows file archiver WinRAR. Security researchers at the Zero Day Initiative who first identified this vulnerability in June have published a security advisory about this flaw now that an update has been issued by the vendor. This vulnerability has the possibility of allowing remote, unauthenticated

WinRAR Remote Code Execution Flaw Patched Read More »

Stack-Based Buffer Overflows in Ivanti Avalanche

Multiple stack-based buffer overflows have been identified in Ivanti Avalanche, tracked as a single vulnerability with a critical severity rating and CVSS base score of 9.8/10. Ivanti Avalanche is an enterprise mobility management (EMM) solution used by organisations to manage and monitor mobile devices securely. Researchers at Tenable discovered and investigated these flaws, publishing an

Stack-Based Buffer Overflows in Ivanti Avalanche Read More »

Microsoft Teams Used in Social Engineering Attacks

Highly targeted phishing attacks have been carried out by the threat actor Midnight Blizzard, previously known as NOBELIUM, via Microsoft Teams. These attacks targeted a range of organisations including government and non-government organisations, IT services, technology businesses, manufacturing, and media companies. Through social engineering techniques Midnight Blizzard were able to achieve token and credential theft

Microsoft Teams Used in Social Engineering Attacks Read More »

0

No products in the basket.

No products in the basket.