A Tax-Themed Phishing Scam Propagating TimbreStealer Malware Targeting IT Users

Since as far back as November 2023, Mexican users have been the target of an intricately designed tax-themed scam email. This sophisticated scheme disseminates a type of Windows malware, previously unseen and now identified as TimbreStealer. Cisco Talos detected the activity and noted the…


0 Comments4 Minutes

Emerging Wi-Fi vulnerabilities grant hackers access to Android and Linux devices

Two authentication circumvent vulnerabilities have been discovered in open-source Wi-Fi software installed on Android, Linux, and ChromeOS devices. These vulnerabilities have the potential to deceive users into connecting to a rogue network replicating a legitimate one, or to grant an attacker…


0 Comments4 Minutes

Immediately uninstall EAP; a critical flaw threatens Active Directory

VMware strongly advises users to remove the obsolete Enhanced Authentication Plugin (EAP) immediately after discovering a critical security vulnerability. This vulnerability, officially labeled CVE-2024-22245 with a CVSS score of 9.6, is described as an arbitrary authentication relay flaw.…


0 Comments4 Minutes

OpenAI Unveils Sora: Text-to-Video Tool Making Waves Online

Prepare to be amazed by OpenAI’s latest creation. Imagine typing in some text, hitting enter, and voila! A hyper-realistic video materializes before your eyes with the help of Artificial Intelligence. It’s called Sora, and let me tell you, the internet is abuzz with…


0 Comments3 Minutes

CISA Warns of Active ‘Roundcube’ Email Attacks

A security flaw of medium severity that affects Roundcube email software was added to the database of Known Exploited Vulnerabilities (KEV) on Monday by the United States Cybersecurity and Infrastructure Security Agency (CISA). This flaw affects Roundcube email software. This particular…


0 Comments3 Minutes

AnyDesk Security Breach Requires Password Reset

On Friday, AnyDesk disclosed a cyber intrusion compromising its production systems. Following a security check, the German firm confirmed the incident, clarifying it as non-ransomware, and promptly notified authorities. The corporation stated, “We have revoked all security-related…


0 Comments4 Minutes

Top Security Posture Vulnerabilities

Our cybersecurity posture faces new challenges and opportunities each New Year. The speed at which hostile actors launch advanced persistent attacks makes cyber resilience an ongoing battle. Cybersecurity’s excitement comes from adapting and learning to stay ahead of threats. Working in a…


1 Comment9 Minutes