Sunday , February 23 2025

TimeLine Layout

May, 2024

  • 28 May

    Hacker targeting Check Point VPNs to breach enterprise networks

    Coding

    Check Point warned that threat actors are targeting their Remote Access VPN devices in an ongoing campaign to breach enterprise networks. Remote Access is included in all Check Point network firewalls. It can be set up as a client-to-site VPN for accessing corporate networks using VPN clients, or as an …

    Read More »
  • 28 May

    TP-Link Gaming Router Vulnerability Exposes Users to Remote Code Attacks

    TP- Link

    A serious security flaw has been found in the TP-Link Archer C5400X gaming router. It could allow remote code execution on vulnerable devices by sending specific requests. The vulnerability CVE-2024-5035 has a CVSS score of 10.0 and affects all versions of the router firmware up to 1_1.1.6. It has been …

    Read More »
  • 28 May

    New ATM Malware Threatens Banking Security worldwide

    ATM

    There appeared a new type of ATM malware that security experts warn about. It is being advertised in the cybercrime underground and specifically designed to target Europe. A bad actor claimed that the new ATM malware called “EU ATM Malware” has 99% success rate. It can compromise most ATMs in …

    Read More »
  • 28 May

    Daily Cybersecurity update, May 27, 2024

    DAILY CYBER KEY

    Infosecbulletin’s daily cyber security update is a daily basis security updates across the globe. This aim is to inform the readers todays happenings in cyber world. Using various ways the information is collected and only the headlines are shown here. Users are advised to read out the full report for …

    Read More »
  • 27 May

    ENEA BOLG POST
    Cybercriminals exploit top 3 cloud storage for SMS scams

    Cloud

    Researchers found criminal SMS phishing scam campaigns that exploit cloud storage services like Amazon S3, Google Cloud Storage, Backblaze B2, and IBM Cloud Object Storage. These campaigns, run by unknown threat actors, aim to send SMS messages to redirect users to malicious websites in order to steal their information. According …

    Read More »
  • 27 May

    Chronon: a open-source data platform for AI/ML applications

    CHORON

    Chronon simplifies data computation and serving for AI/ML apps. Users define data features, and Chronon handles batch and streaming computation, scalable backfills, low-latency serving, correctness, consistency, observability, and monitoring. It allows you to utilize all of the data within your organization, from batch tables, event streams or services to power …

    Read More »
  • 27 May

    Researcher claimed: Biometrics of Indian Forces Exposed

    face recognition

    Jeremiah Fowler, a security researcher, claimed to discover a major vulnerability in India’s data security. He found an unprotected database with a large amount of biometric data, such as fingerprints, facial scans, and other sensitive information, belonging to millions of Indian citizens. Jeremiah Fowler published his findings on global planet. …

    Read More »
  • 26 May

    NSA Releases Guidance on Zero Trust Maturity

    NIST

    The NSA released an information sheet called “Advancing Zero Trust Maturity Throughout the Application and Workload Pillar.” This sheet will help organizations protect their applications from unauthorized users and maintain constant visibility of their workload. This CSI gives recommendations for achieving different levels of application and workload capabilities under the …

    Read More »
  • 25 May

    Data protection is sovereignty: Mohammad A. Arafat
    INFOCOM Dhaka ends promoting cyber resiliency

    infocom

    The two day long 7th edition of INFOCOM, India’s biggest business, technology, and leadership event, themed “Sustainable Disruption”, concluded today in Dhaka. The event gathered over 50 speakers from government, business, IT, media, academia, and other leaders from Bangladesh and India. “INFOCOM Dhaka’s main objective is to drive collaborative growth …

    Read More »
  • 25 May

    Phoenix Summit 2024
    Two days phoenix summit ended successfully at Dhaka

    photoshot

    TheTeamPhoenix, a non-profit organization, successfully hosted Phoenix Summit 2024, the largest cyber security event in Bangladesh, from May 23-24. This summit aimed to inspire and empower both novices and seasoned enthusiasts, professionals in the field of cyber security and technology. Phoenix Summit 2024 was more than just a conference; it …

    Read More »