Sunday , January 5 2025

TimeLine Layout

December, 2024

  • 5 December

    Singapore embraces AI data centres with smarter cooling systems

    data centers

    AI and GPU operations are crucial for modern data centers, but they generate significant energy consumption and heat. A new SG$ 8 million project in Singapore aims to transform cooling solutions for these facilities to meet performance demands and global sustainability goals. Data centres are crucial for the digital age …

    Read More »
  • 5 December

    Daily Security Update Dated: 04.12.2024

    Every day a lot of cyberattack happen around the world including ransomware, Malware attack, data breaches, website defacement and so on. Its our daily security digest to cover the latest happenings in the world. Spend a bit time to read out todays update: Record-Breaking $2 Million Bounty Offered To Crypto.com …

    Read More »
  • 5 December

    JP CERT warns I-O DATA zero-day router flaws:Update Needed!

    I-O DATA

    Multiple vulnerabilities found in I-O DATA routers UD-LT1 and UD-LT1/EX are being actively exploited. JPCERT/CC, a Japanese cybersecurity organization, has warned that these issues could lead to serious attacks, including credential theft, command execution, and total firewall bypass. “The developer states that attacks exploiting these vulnerabilities have been observed,” warns …

    Read More »
  • 4 December

    Telecoms on High Alert: CISA, NSA, FBI Publish joint guideline

    CISA NSA FBI

    National Security Agency (NSA), The Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI) jointly published guideline to enhanced visibility and hardening guidance for communications infrastructure providing best practices to protect against PRC affiliated threat actor. According to the guideline above mentioned threat actor has compromised networks …

    Read More »
  • 4 December

    CISA Flags 3 Actively Exploited Vulnerabilities in KEV

    CISA

    CISA has issued an alert about three critical security vulnerabilities that are currently being exploited. These issues are now part of CISA’s Known Exploited Vulnerabilities (KEV) catalog and require urgent action from organizations and individuals to avoid potential risks. Vulnerability Breakdown: CVE-2023-45727 (CVSS 7.5): A vulnerability in Proself Enterprise/Standard Edition, …

    Read More »
  • 3 December

    Cisco Confirms Active Exploitation Of Decade-Old WebVPN Vulnerability

    WebVPN

    Cisco has released an updated security advisory about CVE-2014-2120, a vulnerability in the WebVPN login page of Cisco Adaptive Security Appliance (ASA) Software. This flaw, disclosed in 2014, allows unauthenticated remote attackers to perform cross-site scripting (XSS) attacks on WebVPN users. The advisory highlights that this vulnerability is currently being …

    Read More »
  • 3 December

    TP-Link Archer Security Flaw Exposes Devices to Malicious Command Injection

    Router

    A serious zero-day vulnerability has been found in TP-Link Archer, Deco, and Tapo routers, which could let attackers inject harmful commands and take full control of the devices. This vulnerability affects both old and recent firmware versions of popular router models, raising serious security concerns for users until November 4, …

    Read More »
  • 2 December

    IBM address multiple flaw in security verify access appliance

    IBM

    IBM revealed several critical vulnerabilities in its Security Verify Access Appliance, which could pose serious security risks to users identified as (CVE-2024-49803, CVE-2024-49804, CVE-2024-49805, CVE-2024-49806). These vulnerabilities affect versions 10.0.0 – 10.0.8 IF1. CVE-2024-49803 is a critical vulnerability with a CVSS score of 9.8. IBM cybersecurity researchers found that this …

    Read More »
  • 2 December

    “Rockstar 2FA” Targets Microsoft 365 Users with AiTM Attacks

    Rockstar 2FA

    Cybersecurity researchers are alerting users about phishing email campaigns using a toolkit called “Rockstar 2FA” to steal Microsoft 365 account credentials. These campaigns use advanced techniques to create fake landing pages resembling real Microsoft 365 login pages. Their main goal is to steal user credentials, targeting Microsoft accounts. This campaign …

    Read More »
  • 1 December

    Workshop on “DDoS use cases & solutions for government & BFSI” held at BCS

    participants

    A workshop on “DDoS use cases & solutions for government & BFSI” held at Bangladesh computer society premises on Saturday (30.11.24) where about 100 participants attended. Bangladesh computer society is regarded as the leading professional and learned society in the field of computers and information systems in Bangladesh. BCS said, it …

    Read More »

This will close in 6 seconds