Topic: network security

  • Detect Malicious Traffic with Maltrail: Open-Source Security Tool

    Detect Malicious Traffic with Maltrail: Open-Source Security Tool

    Maltrail is an open-source cybersecurity tool that detects malicious network traffic by comparing data against public blacklists of known threats like domains, IPs, and URLs. Its architecture uses sensors to monitor network traffic and send alerts to a central server, which logs events and suppor...

    Read More »
  • How Attackers Weaponize Communication Networks

    How Attackers Weaponize Communication Networks

    Communication networks are now the primary target for cyber attackers, offering vast data access for espionage, financial crime, and other malicious intents. Attackers exploit built-in network tools and lawful intercept systems to passively monitor and steal credentials, enabling large-scale surv...

    Read More »
  • Nevada State Offices Shut Down by Major Network Security Incident

    Nevada State Offices Shut Down by Major Network Security Incident

    A major network security incident has forced Nevada state government offices to close and disrupted digital services, with recovery efforts ongoing. State offices have suspended in-person services and residents should expect intermittent outages, though no timeline for full restoration has been p...

    Read More »
  • Huawei Debuts AI-Driven Resilient Network Solution at GITEX 2025

    Huawei Debuts AI-Driven Resilient Network Solution at GITEX 2025

    Huawei launched its Enterprise Network Integration Service 6.0 at GITEX Global 2025, designed to help organizations build resilient, secure, and intelligent network systems with full lifecycle support from design to optimization. The solution delivers industry-specific benefits, including 99.999%...

    Read More »
  • Webinar: How Stolen Credentials Threaten Your Network Security

    Webinar: How Stolen Credentials Threaten Your Network Security

    Cybercriminals increasingly use stolen credentials to bypass complex hacking methods, making identity security a top priority, as highlighted in an upcoming July 9th webinar by cybersecurity experts. The webinar will explore credential-based attacks, including infostealer malware and tactics like...

    Read More »
  • Top Cybersecurity Jobs Hiring Now: October 2025

    Top Cybersecurity Jobs Hiring Now: October 2025

    The cybersecurity job market is robust, offering diverse opportunities globally for professionals at all levels to help companies strengthen defenses against evolving threats. Current openings span various roles and locations, including remote, on-site, and hybrid positions, such as Cyber Securit...

    Read More »
  • F5 Hack Puts Thousands of Networks at Imminent Risk

    F5 Hack Puts Thousands of Networks at Imminent Risk

    A sophisticated nation-state hacking group breached F5's network, exposing proprietary source code and undisclosed vulnerability data, endangering thousands of government and corporate networks that rely on BIG-IP appliances. The attackers maintained persistent access for years, gaining control o...

    Read More »
  • Critical DrayTek Router Flaw Allows Remote Code Execution

    Critical DrayTek Router Flaw Allows Remote Code Execution

    A critical vulnerability (CVE-2025-10547) in DrayTek routers allows unauthenticated remote attackers to execute commands via crafted HTTP/HTTPS requests, potentially leading to system crashes or code execution. DrayTek has released firmware updates for 35 router models and advises immediate insta...

    Read More »
  • Powering the Gulf's Next Connectivity Revolution

    Powering the Gulf's Next Connectivity Revolution

    The Gulf region is rapidly becoming a digital innovation hub, with advanced private networks and AI transforming key industries like oil and gas, logistics, and manufacturing, moving beyond traditional telecommunications services. Ericsson is driving this shift by focusing on technologies such as...

    Read More »
  • Microsoft Fixes Critical WSUS Flaw Under Active Attack

    Microsoft Fixes Critical WSUS Flaw Under Active Attack

    Microsoft has released an emergency patch for a critical, actively exploited vulnerability (CVE-2025-59287) in Windows Server Update Services, allowing unauthorized remote code execution without user interaction. The flaw is wormable and could enable attackers to take control of WSUS servers, pot...

    Read More »
  • Cancer Council Queensland Boosts IT with Macquarie Telecom

    Cancer Council Queensland Boosts IT with Macquarie Telecom

    Cancer Council Queensland has partnered with Macquarie Telecom to enhance its IT infrastructure, enabling the charity to focus more resources on cancer research, prevention, and patient care. The partnership includes a secure SD-WAN and SASE framework, along with cybersecurity upgrades like SOC a...

    Read More »
  • Innoventures Education Boosts Learning with HPE Aruba AI Platform

    Innoventures Education Boosts Learning with HPE Aruba AI Platform

    Innoventures Education has enhanced its digital learning infrastructure by implementing HPE Aruba Networking Central, an AI-driven platform that supports over 9,000 students and 1,500 staff across multiple campuses, ensuring secure and reliable connectivity. The platform provides real-time visibi...

    Read More »
  • Netgear Launches New Orbi 370 Series WiFi 7 Routers

    Netgear Launches New Orbi 370 Series WiFi 7 Routers

    Netgear has launched the Orbi 370 Series, a WiFi 7 mesh system that offers high performance at a more accessible price point, starting from AUD $479, making advanced WiFi 7 technology available to households with moderate needs. The system provides ultra-fast speeds up to 5Gbps, comprehensive who...

    Read More »
  • PwC: AI Leads Cybersecurity Spending as Top Priority

    PwC: AI Leads Cybersecurity Spending as Top Priority

    Artificial intelligence is now the top cybersecurity spending priority for businesses, reflecting a strategic shift toward AI-driven defense mechanisms against evolving digital threats. AI-based security solutions lead budget priorities at 36%, surpassing other areas like cloud security and netwo...

    Read More »
  • Critical RCE Flaw in Western Digital My Cloud NAS (CVE-2025-30247)

    Critical RCE Flaw in Western Digital My Cloud NAS (CVE-2025-30247)

    Western Digital has released a critical firmware update (version 5.31.108) to fix a severe remote code execution vulnerability (CVE-2025-30247) in multiple My Cloud NAS models, urging immediate installation to prevent unauthorized access and system takeover. The vulnerability is an OS command inj...

    Read More »
  • Cloudflare Balances Data Security with AI Access

    Cloudflare Balances Data Security with AI Access

    Cloudflare One has been enhanced to help businesses securely integrate and manage generative AI tools while maintaining data protection and compliance standards. New features include AI Security Posture Management (AI-SPM), offering discovery of AI usage patterns, protection against unapproved AI...

    Read More »
  • China's Salt Typhoon Hackers Target European Telecoms

    China's Salt Typhoon Hackers Target European Telecoms

    A China-linked cyber espionage group known as Salt Typhoon is targeting European telecommunications providers to infiltrate critical infrastructure for intelligence gathering and surveillance. The attackers exploited a Citrix NetScaler Gateway vulnerability, deployed the SNAPPYBEE backdoor via DL...

    Read More »
  • Humanoid Robot Hacked via Bluetooth, Data Sent to China

    Humanoid Robot Hacked via Bluetooth, Data Sent to China

    The Unitree G1 humanoid robot has critical Bluetooth vulnerabilities that allow unauthorized root access and remote code execution due to shared hardcoded encryption keys and improper data validation during setup. Weak encryption in the robot's configuration files and unsecured communication prot...

    Read More »
  • HCLTech Joins GSMA to Drive Telecom Innovation

    HCLTech Joins GSMA to Drive Telecom Innovation

    HCLTech has become the first global technology company to join the GSMA Open Gateway initiative, aiming to accelerate programmable networks and create new monetization opportunities for Communication Service Providers worldwide. The partnership will leverage HCLTech's advanced solutions, includin...

    Read More »
  • Hiring Now: Top Cybersecurity Jobs in September 2025

    Hiring Now: Top Cybersecurity Jobs in September 2025

    A wide range of top cybersecurity roles are available globally in September 2025, reflecting high demand for experts in protecting digital assets across various industries and work arrangements. Key positions include specialized roles such as Application Security Architect, Chief Information Secu...

    Read More »
  • 70% of Smart Home Devices Vulnerable to Cyber Attacks, UAE Council Warns

    70% of Smart Home Devices Vulnerable to Cyber Attacks, UAE Council Warns

    70% of smart home devices in the UAE are vulnerable to cyberattacks, largely due to risky user behaviors like weak passwords and unsecured networks. The UAE faces intense cyber threats, including a 30% increase in ransomware and AI-powered attacks like deepfakes and autonomous malware. The UAE ha...

    Read More »
  • Unlocking the .54lg9 File Extension: What You Need to Know

    Unlocking the .54lg9 File Extension: What You Need to Know

    The .54lg9 file extension indicates a ransomware infection that can encrypt files on the infected device and spread across networks, complicating recovery. Without reliable backups, restoration options are limited; paying the ransom is discouraged, and instead, isolation, professional help, and r...

    Read More »
  • Hiring Now: Top Cybersecurity Jobs for September 2025

    Hiring Now: Top Cybersecurity Jobs for September 2025

    The cybersecurity job market is expanding rapidly due to increasing cyber threats, with high demand for specialized roles across various sectors and countries. Key positions include Chief Information Security Officers (CISOs) who develop security strategies and manage risk, and other roles like C...

    Read More »
  • Libya's Medusa Cable Reaches Marseille in Key Milestone

    Libya's Medusa Cable Reaches Marseille in Key Milestone

    The Medusa Submarine Cable has reached its first Mediterranean landing point in Marseille, marking a key advancement for Libya's digital infrastructure and its role in international connectivity. Spanning 8,700 kilometers with 19 landing points, the cable will enhance high-capacity digital links ...

    Read More »
  • Global Data Breach Risk Soars from Indian Suppliers

    Global Data Breach Risk Soars from Indian Suppliers

    Over half of key Indian suppliers experienced a third-party breach in the last year, posing risks to global businesses in sectors like semiconductors and pharmaceuticals. Outsourced IT and managed service providers were responsible for nearly two-thirds of breaches, with network security flaws an...

    Read More »
  • HPE, Ericsson Partner to Validate 5G Core for Seamless Networks

    HPE, Ericsson Partner to Validate 5G Core for Seamless Networks

    HPE and Ericsson have established a joint validation lab to tackle the complexities of deploying multi-vendor 5G infrastructure, focusing on a cloud-native, AI-enhanced dual-mode 5G core solution for high-performance, scalable networks. The lab will test interoperability using Ericsson's 5G Core,...

    Read More »
  • Stealth Malware Campaign Infects Thousands via DNS TXT Abuse

    Stealth Malware Campaign Infects Thousands via DNS TXT Abuse

    The Detour Dog malware campaign has infected over 30,000 websites, using DNS TXT records for server-side attacks that remain hidden from most users, selectively targeting specific visitors for redirection or malware downloads. This attack operates by having compromised servers send DNS queries wi...

    Read More »
  • 5.4M Healthcare Records Exposed in Episource Data Breach

    5.4M Healthcare Records Exposed in Episource Data Breach

    A healthcare data breach at Episource exposed sensitive information of over 5.4 million individuals, including names, Social Security numbers, and medical histories, with Medicaid/Medicare beneficiaries heavily impacted. The breach highlights vulnerabilities in third-party healthcare vendors, as ...

    Read More »
  • Boost AI Truthfulness with Logic: AWS Expert Insights

    Boost AI Truthfulness with Logic: AWS Expert Insights

    Automated reasoning is emerging as a key AI tool, combining mathematical logic with AI to ensure reliability and verify truth in critical applications like security and finance. Unlike generative AI, automated reasoning provides definitive answers through logical proofs, enabling rapid validation...

    Read More »
  • Nevada Shuts Down State Offices After Major Cyberattack

    Nevada Shuts Down State Offices After Major Cyberattack

    A widespread cyberattack forced the closure of all Nevada state offices, disrupting digital services and phone systems but leaving emergency services like 911 unaffected. The incident, confirmed as a cybersecurity breach, prompted a 24/7 recovery effort with no current evidence of compromised per...

    Read More »
  • Master Zero Trust & Identity at Today's Virtual Summit

    Master Zero Trust & Identity at Today's Virtual Summit

    The SecurityWeek Zero Trust & Identity Strategies Summit 2025 is a virtual event focusing on modern cybersecurity frameworks and the evolution of Zero Trust into a core strategy for protecting corporate assets. Zero Trust Network Access (ZTNA) is highlighted as essential for strengthening access ...

    Read More »
  • TP-Link BE3600: The Ultimate Affordable Travel Router

    TP-Link BE3600: The Ultimate Affordable Travel Router

    The TP-Link BE3600 Wi-Fi 7 Travel Router is currently available for $99.99 at Amazon using a promotional code, offering a $40 discount and the lowest price seen for this device. This compact router simplifies connecting multiple devices to public Wi-Fi by creating a secure private network, suppor...

    Read More »