Topic: network security
-
Detect Malicious Traffic with Maltrail: Open-Source Security Tool
Maltrail is an open-source cybersecurity tool that detects malicious network traffic by comparing data against public blacklists of known threats like domains, IPs, and URLs. Its architecture uses sensors to monitor network traffic and send alerts to a central server, which logs events and suppor...
Read More » -
How Attackers Weaponize Communication Networks
Communication networks are now the primary target for cyber attackers, offering vast data access for espionage, financial crime, and other malicious intents. Attackers exploit built-in network tools and lawful intercept systems to passively monitor and steal credentials, enabling large-scale surv...
Read More » -
Nevada State Offices Shut Down by Major Network Security Incident
A major network security incident has forced Nevada state government offices to close and disrupted digital services, with recovery efforts ongoing. State offices have suspended in-person services and residents should expect intermittent outages, though no timeline for full restoration has been p...
Read More » -
FCC to Roll Back ISP Cybersecurity Mandate
The FCC is reversing a cybersecurity mandate for internet providers after industry lobbying, with Chairman Brendan Carr arguing it overstepped legal authority and that companies have already improved security voluntarily. The original 2025 ruling responded to state-sponsored cyberattacks like Chi...
Read More » -
Huawei Debuts AI-Driven Resilient Network Solution at GITEX 2025
Huawei launched its Enterprise Network Integration Service 6.0 at GITEX Global 2025, designed to help organizations build resilient, secure, and intelligent network systems with full lifecycle support from design to optimization. The solution delivers industry-specific benefits, including 99.999%...
Read More » -
Bitdefender & NETGEAR: Rising Home Cybersecurity Threats
Modern homes face nearly triple the daily cybersecurity attacks compared to last year, with households averaging 22 connected devices and enduring about 29 attacks daily. Entertainment devices like streaming systems, smart TVs, and IP cameras are the most vulnerable, often unpatched and accountin...
Read More » -
Extreme Unleashes Wi-Fi 7: Faster, Smarter, Secure Global Connectivity
Extreme Networks' Wi-Fi 7 solutions deliver faster speeds, greater reliability, and enhanced efficiency, benefiting diverse organizations like universities, healthcare providers, and entertainment venues. Key features include dual IoT radios, PoE failover, and always-on encryption, which reduce e...
Read More » -
Bitdefender & NETGEAR: Rising Threats to Your Connected Home
The average household now contains 22 connected devices and faces nearly 29 daily cyberattacks, a nearly threefold increase from the previous year, highlighting the growing threat to smart homes. Entertainment devices like streaming gadgets, smart TVs, and IP cameras are the most vulnerable, ofte...
Read More » -
Henkel CISO: The Messy Reality of Legacy Factory Monitoring
Modern smart factories face unique cybersecurity risks due to the convergence of legacy equipment and cloud platforms, requiring comprehensive visibility, local autonomy, and strict vendor accountability to build resilience. A critical vulnerability is the over-reliance on single points of failur...
Read More » -
Critical Flaws Exposed in Smart Air Compressor
Smart air compressors like the CAT-10020SMHAD with MDR2i controllers offer digital convenience but introduce cybersecurity risks, including vulnerabilities that could disrupt operations or manipulate data. Security flaws identified include hardcoded Wi-Fi passwords, unencrypted HTTP communication...
Read More » -
Webinar: How Stolen Credentials Threaten Your Network Security
Cybercriminals increasingly use stolen credentials to bypass complex hacking methods, making identity security a top priority, as highlighted in an upcoming July 9th webinar by cybersecurity experts. The webinar will explore credential-based attacks, including infostealer malware and tactics like...
Read More » -
Morphisec's Enhanced Anti-Ransomware Blocks Evasive Attacks
Morphisec's Anti-Ransomware Assurance Suite has been upgraded with new features, including Network Share Ransomware Protection, Identity Risk Visibility, and enhanced EDR Tamper Protection, to proactively address critical security gaps. The Network Share Protection blocks ransomware encryption at...
Read More » -
Top Black Friday 2025 Cybersecurity Deals to Secure
Black Friday 2025 offers significant discounts on cybersecurity tools, making enterprise-grade protection more affordable for businesses to secure their systems and data. Featured products include Passwork for password management, NordLayer for network security, NordPass for credential management...
Read More » -
Infoblox Hits 200 Customers, Unveils New Network Transformation Tools
Over 200 organizations now use Infoblox's Universal DDI Product Suite to modernize network infrastructure, addressing the need for unified solutions in hybrid and multi-cloud environments. The platform integrates essential network services into a single SaaS management plane, reducing manual task...
Read More » -
Urgent: Actively Exploited WSUS Bug Now on CISA KEV List
A critical security flaw (CVE-2025-59287) in Windows Server Update Services (WSUS) allows unauthenticated attackers to execute remote code with system privileges by exploiting the GetCookie() endpoint. The vulnerability is under active exploitation, prompting urgent patching by Microsoft and incl...
Read More » -
Top Cybersecurity Jobs Hiring Now: October 2025
The cybersecurity job market is robust, offering diverse opportunities globally for professionals at all levels to help companies strengthen defenses against evolving threats. Current openings span various roles and locations, including remote, on-site, and hybrid positions, such as Cyber Securit...
Read More » -
F5 Hack Puts Thousands of Networks at Imminent Risk
A sophisticated nation-state hacking group breached F5's network, exposing proprietary source code and undisclosed vulnerability data, endangering thousands of government and corporate networks that rely on BIG-IP appliances. The attackers maintained persistent access for years, gaining control o...
Read More » -
Critical DrayTek Router Flaw Allows Remote Code Execution
A critical vulnerability (CVE-2025-10547) in DrayTek routers allows unauthenticated remote attackers to execute commands via crafted HTTP/HTTPS requests, potentially leading to system crashes or code execution. DrayTek has released firmware updates for 35 router models and advises immediate insta...
Read More » -
US agencies urged to patch Cisco firewalls amid active attacks
U.S. federal agencies must immediately patch vulnerable Cisco firewalls due to active exploitation of security flaws in Cisco ASA software by sophisticated threat actors. CISA's emergency directive highlights that many federal systems remain unpatched, risking critical infrastructure and sensitiv...
Read More » -
Powering the Gulf's Next Connectivity Revolution
The Gulf region is rapidly becoming a digital innovation hub, with advanced private networks and AI transforming key industries like oil and gas, logistics, and manufacturing, moving beyond traditional telecommunications services. Ericsson is driving this shift by focusing on technologies such as...
Read More » -
Microsoft Fixes Critical WSUS Flaw Under Active Attack
Microsoft has released an emergency patch for a critical, actively exploited vulnerability (CVE-2025-59287) in Windows Server Update Services, allowing unauthorized remote code execution without user interaction. The flaw is wormable and could enable attackers to take control of WSUS servers, pot...
Read More » -
Cancer Council Queensland Boosts IT with Macquarie Telecom
Cancer Council Queensland has partnered with Macquarie Telecom to enhance its IT infrastructure, enabling the charity to focus more resources on cancer research, prevention, and patient care. The partnership includes a secure SD-WAN and SASE framework, along with cybersecurity upgrades like SOC a...
Read More » -
Top Cybersecurity Jobs Hiring Now: December 2025
The cybersecurity field offers diverse, in-demand career paths globally, with organizations actively seeking talent for roles ranging from threat intelligence to cloud security architecture. Specific high-demand roles include threat intelligence analysts, security managers, architects, and engine...
Read More » -
Top Cybersecurity Jobs Hiring Now | November 2025
The cybersecurity job market offers diverse, high-impact roles globally, from leadership to technical positions, aimed at protecting organizations' digital assets. Key roles include strategic leadership like CISOs defining security roadmaps and technical engineers managing security platforms and ...
Read More » -
US Border Patrol Surveils Millions of American Drivers
The US Border Patrol operates a predictive-intelligence program using hidden license-plate readers to monitor American drivers far from borders, flagging "suspicious" travel patterns and leading to stops and searches, raising Fourth Amendment concerns. Microsoft mitigated the largest recorded DDo...
Read More » -
Innoventures Education Boosts Learning with HPE Aruba AI Platform
Innoventures Education has enhanced its digital learning infrastructure by implementing HPE Aruba Networking Central, an AI-driven platform that supports over 9,000 students and 1,500 staff across multiple campuses, ensuring secure and reliable connectivity. The platform provides real-time visibi...
Read More » -
Netgear Launches New Orbi 370 Series WiFi 7 Routers
Netgear has launched the Orbi 370 Series, a WiFi 7 mesh system that offers high performance at a more accessible price point, starting from AUD $479, making advanced WiFi 7 technology available to households with moderate needs. The system provides ultra-fast speeds up to 5Gbps, comprehensive who...
Read More » -
PwC: AI Leads Cybersecurity Spending as Top Priority
Artificial intelligence is now the top cybersecurity spending priority for businesses, reflecting a strategic shift toward AI-driven defense mechanisms against evolving digital threats. AI-based security solutions lead budget priorities at 36%, surpassing other areas like cloud security and netwo...
Read More » -
Critical RCE Flaw in Western Digital My Cloud NAS (CVE-2025-30247)
Western Digital has released a critical firmware update (version 5.31.108) to fix a severe remote code execution vulnerability (CVE-2025-30247) in multiple My Cloud NAS models, urging immediate installation to prevent unauthorized access and system takeover. The vulnerability is an OS command inj...
Read More » -
Microsoft Issues Critical Windows Update Amid Active Attacks
Microsoft has issued an urgent security update for Windows Server to patch a critical vulnerability (CVE-2025-59287) that is actively being exploited, allowing remote code execution with system privileges. Only servers with the WSUS Server Role enabled are vulnerable, and CISA has mandated federa...
Read More » -
Cloudflare Balances Data Security with AI Access
Cloudflare One has been enhanced to help businesses securely integrate and manage generative AI tools while maintaining data protection and compliance standards. New features include AI Security Posture Management (AI-SPM), offering discovery of AI usage patterns, protection against unapproved AI...
Read More » -
China's Salt Typhoon Hackers Target European Telecoms
A China-linked cyber espionage group known as Salt Typhoon is targeting European telecommunications providers to infiltrate critical infrastructure for intelligence gathering and surveillance. The attackers exploited a Citrix NetScaler Gateway vulnerability, deployed the SNAPPYBEE backdoor via DL...
Read More » -
CPU Spike Exposed RansomHub Ransomware Attack
An employee inadvertently triggered a ransomware attack by downloading a malicious file disguised as a browser update, initiating automated reconnaissance and credential harvesting. Attackers established persistence and network access through a SOCKS proxy, exploiting Active Directory weaknesses ...
Read More » -
Humanoid Robot Hacked via Bluetooth, Data Sent to China
The Unitree G1 humanoid robot has critical Bluetooth vulnerabilities that allow unauthorized root access and remote code execution due to shared hardcoded encryption keys and improper data validation during setup. Weak encryption in the robot's configuration files and unsecured communication prot...
Read More » -
HCLTech Joins GSMA to Drive Telecom Innovation
HCLTech has become the first global technology company to join the GSMA Open Gateway initiative, aiming to accelerate programmable networks and create new monetization opportunities for Communication Service Providers worldwide. The partnership will leverage HCLTech's advanced solutions, includin...
Read More » -
Hiring Now: Top Cybersecurity Jobs in September 2025
A wide range of top cybersecurity roles are available globally in September 2025, reflecting high demand for experts in protecting digital assets across various industries and work arrangements. Key positions include specialized roles such as Application Security Architect, Chief Information Secu...
Read More » -
70% of Smart Home Devices Vulnerable to Cyber Attacks, UAE Council Warns
70% of smart home devices in the UAE are vulnerable to cyberattacks, largely due to risky user behaviors like weak passwords and unsecured networks. The UAE faces intense cyber threats, including a 30% increase in ransomware and AI-powered attacks like deepfakes and autonomous malware. The UAE ha...
Read More » -
Unlocking the .54lg9 File Extension: What You Need to Know
The .54lg9 file extension indicates a ransomware infection that can encrypt files on the infected device and spread across networks, complicating recovery. Without reliable backups, restoration options are limited; paying the ransom is discouraged, and instead, isolation, professional help, and r...
Read More » -
Hiring Now: Top Cybersecurity Jobs for September 2025
The cybersecurity job market is expanding rapidly due to increasing cyber threats, with high demand for specialized roles across various sectors and countries. Key positions include Chief Information Security Officers (CISOs) who develop security strategies and manage risk, and other roles like C...
Read More » -
Libya's Medusa Cable Reaches Marseille in Key Milestone
The Medusa Submarine Cable has reached its first Mediterranean landing point in Marseille, marking a key advancement for Libya's digital infrastructure and its role in international connectivity. Spanning 8,700 kilometers with 19 landing points, the cable will enhance high-capacity digital links ...
Read More » -
Global Data Breach Risk Soars from Indian Suppliers
Over half of key Indian suppliers experienced a third-party breach in the last year, posing risks to global businesses in sectors like semiconductors and pharmaceuticals. Outsourced IT and managed service providers were responsible for nearly two-thirds of breaches, with network security flaws an...
Read More » -
Fortinet Patches Actively Exploited FortiWeb Zero-Day
Fortinet has patched a critical zero-day vulnerability (CVE-2025-64446) in its FortiWeb firewall, which is being actively exploited to create unauthorized admin accounts via unauthenticated HTTP requests. The flaw affects FortiWeb versions 8.0.1 and earlier, with a fix available in version 8.0.2,...
Read More » -
State-Sponsored Hackers Breached SonicWall in September
State-sponsored hackers breached SonicWall's cloud environment in September, accessing firewall configuration backup files via an API call, but no products, firmware, or customer networks were compromised. The exposed backup files contained sensitive credentials, prompting SonicWall to advise aff...
Read More » -
Albireo PCS: Secure Managed Cloud vs On-Premise Servers
Albireo Energy's Private Cloud Services (PCS) is a secure, managed cloud platform for Building Automation and Energy Power Management Systems, offering an alternative to on-premise servers that reduces capital investment and security risks. PCS separates operational technology from IT infrastruct...
Read More » -
HPE, Ericsson Partner to Validate 5G Core for Seamless Networks
HPE and Ericsson have established a joint validation lab to tackle the complexities of deploying multi-vendor 5G infrastructure, focusing on a cloud-native, AI-enhanced dual-mode 5G core solution for high-performance, scalable networks. The lab will test interoperability using Ericsson's 5G Core,...
Read More » -
Stealth Malware Campaign Infects Thousands via DNS TXT Abuse
The Detour Dog malware campaign has infected over 30,000 websites, using DNS TXT records for server-side attacks that remain hidden from most users, selectively targeting specific visitors for redirection or malware downloads. This attack operates by having compromised servers send DNS queries wi...
Read More » -
5.4M Healthcare Records Exposed in Episource Data Breach
A healthcare data breach at Episource exposed sensitive information of over 5.4 million individuals, including names, Social Security numbers, and medical histories, with Medicaid/Medicare beneficiaries heavily impacted. The breach highlights vulnerabilities in third-party healthcare vendors, as ...
Read More » -
Boost AI Truthfulness with Logic: AWS Expert Insights
Automated reasoning is emerging as a key AI tool, combining mathematical logic with AI to ensure reliability and verify truth in critical applications like security and finance. Unlike generative AI, automated reasoning provides definitive answers through logical proofs, enabling rapid validation...
Read More » -
U.S. Congressional Budget Office Hit by Suspected Foreign Cyberattack
The U.S. Congressional Budget Office experienced a cybersecurity breach by a foreign actor, potentially compromising sensitive communications and data, but operations for Congress continue uninterrupted. The agency has implemented immediate containment measures, enhanced monitoring, and new secur...
Read More » -
Nevada Shuts Down State Offices After Major Cyberattack
A widespread cyberattack forced the closure of all Nevada state offices, disrupting digital services and phone systems but leaving emergency services like 911 unaffected. The incident, confirmed as a cybersecurity breach, prompted a 24/7 recovery effort with no current evidence of compromised per...
Read More »