Skip to content

Polymath Central

Thoughts and musings of David Greenberg, a polymath

Cybersecurity

Cleo File Transfer Vulnerability Under Exploitation – Patch Pending, Mitigation Urged

December 10, 2024

Users of Cleo-managed file transfer software are being urged to ensure that their instances are not exposed to the internet following reports of mass exploitation of a vulnerability affecting fully…

Cybersecurity

Fake Recruiters Distribute Banking Trojan via Malicious Apps in Phishing Scam

December 10, 2024

Cybersecurity researchers have shed light on a sophisticated mobile phishing (aka mishing) campaign that’s designed to distribute an updated version of the Antidot banking trojan. “The attackers presented themselves as…

Cybersecurity

The Future of Network Security: Automated Internal and External Pentesting

December 10, 2024

In today’s rapidly evolving threat landscape, safeguarding your organization against cyberattacks is more critical than ever. Traditional penetration testing (pentesting), while effective, often falls short due to its high costs,…

Cybersecurity

Hackers Weaponize Visual Studio Code Remote Tunnels for Cyber Espionage

December 10, 2024

A suspected China-nexus cyber espionage group has been attributed to an attacks targeting large business-to-business IT service providers in Southern Europe as part of a campaign codenamed Operation Digital Eye.…

Cybersecurity

Phone Phishing Gang Busted: Eight Arrested in Belgium and Netherlands

December 10, 2024

Belgian and Dutch authorities have arrested eight suspects in connection with a “phone phishing” gang that primarily operated out of the Netherlands with an aim to steal victims’ financial data…

Cybersecurity

CERT-UA Warns of Phishing Attacks Targeting Ukraine’s Defense and Security Force

December 10, 2024

The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of a new set of cyber attacks that it said were aimed at defense companies in the country as well…

Cybersecurity

Ongoing Phishing and Malware Campaigns in December 2024

December 10, 2024

Cyber attackers never stop inventing new ways to compromise their targets. That’s why organizations must stay updated on the latest threats. Here’s a quick rundown of the current malware and…

Cybersecurity

FSB Uses Trojan App to Monitor Russian Programmer Accused of Supporting Ukraine

December 10, 2024

A Russian programmer accused of donating money to Ukraine had his Android device secretly implanted with spyware by the Federal Security Service (FSB) after he was detained earlier this year.…

Cybersecurity

Romania Cancels Presidential Election Results After Alleged Russian Meddling on TikTok

December 10, 2024

In a historic decision, Romania’s constitutional court has annulled the result of the first round of voting in the presidential election amid allegations of Russian interference. As a result, the…

Cybersecurity

Hackers Using Fake Video Conferencing Apps to Steal Web3 Professionals’ Data

December 10, 2024

Cybersecurity researchers have warned of a new scam campaign that leverages fake video conferencing apps to deliver an information stealer called Realst targeting people working in Web3 under the guise…

Posts pagination

1 … 117 118 119 … 128

Polymath Central

Thoughts and musings of David Greenberg, a polymath

Proudly powered by WordPress | Theme: Newsup by Themeansar.