Monthly Archives: August 2024
Hackers leak their own operations through exposed Telegram Bot API tokens
A pair of cybercriminals inadvertently leaked a “treasure trove” of information on their own operations due to exposure of Telegram Bot...
CISA: Attacks leveraging critical SolarWinds RCE underway
Organizations have been warned by the Cybersecurity and Infrastructure Security Agency regarding ongoing intrusions targeting SolarWind...
Trying to tackle tool sprawl? Consolidate at the data source
Sprawl of all types has become a constant, growing problem in enterprises – code sprawl, vendor sprawl, cloud sprawl, and attack surfac...
Bugs in Microsoft apps for macOS could give privileges to attackers
Eight vulnerabilities in six leading Microsoft applications for macOS — including Outlook, Teams, PowerPoint, OneNote, Excel and Word —...
Critical Jenkins vulnerability added to CISA’s known vulnerabilities catalog
A critical vulnerability in the Jenkins open-source continuous integration/continuous delivery (CI/CD) automation server, which could l...
TP-Link finds itself in congressional crosshairs over ties to China
Networking vendor TP-Link found itself under scrutiny from Congress over its links to the Chinese government.In an open letter (PDF) to...
Why Cyber Resilience Matters – Theresa Lanowitz – BSW #361
Theresa Lanowitz is the Chief Cybersecurity Evangelist at LevelBlue, a strategic alliance between AT&T and WillJam Ventures, that s...