Search results for: “cyberattack”
-

German City of Ludwigshafen Suffers Cyberattack, Systems Offline
The German city of Ludwigshafen has taken its ICT systems offline after a cyberattack, disrupting public services and highlighting the vulnerability of critical municipal infrastructure. The incident is under investigation, mirroring a global trend of cyberattacks on local government entities.
-

Australian Signals Directorate Warns of Ongoing BADCANDY Cyberattacks on Cisco IOS XE Devices
The Australian Signals Directorate (ASD) has issued a bulletin regarding ongoing cyberattacks targeting unpatched Cisco IOS XE devices in Australia, utilizing a previously undocumented implant identified as BADCANDY. These attacks exploit CVE-2023-20198, a critical vulnerability that allows remote, unauthenticated attackers to gain elevated privileges.
-

Dutch rail watchdog warns of weak defences against sabotage and cyberattacks
The Overlegorgaan Fysieke Leefomgeving warns the Dutch rail network remains vulnerable to sabotage and cyber threats, urging tighter defence coordination.
-

Machine-Speed Security: Bridging the Exploitation Gap
Machine-Speed Security is crucial in cyber warfare and cybercrime, enabling cybersecurity systems to detect, analyze, and respond to threats at an automated, accelerated pace. This approach aims to bridge the exploitation gap between vulnerability disclosure and exploit weaponization, minimizing the window of exposure against advanced persistent threats and large-scale cyberattacks.
-

What is Operation Endgame?
Operation Endgame is a major international law enforcement initiative aimed at disrupting and dismantling significant cybercrime infrastructure globally, targeting widespread malware families, botnets, and other illicit tools.
-

Cisco Firepower Firewalls: Next-Gen Protection and Critical Vulnerabilities
This article examines Cisco Firepower Firewalls, detailing their next-generation protection capabilities and critical vulnerabilities. It highlights the importance of timely updates as warned by CISA for effective cybersecurity.
-

What is Rhadamanthys Infostealer?
Rhadamanthys Infostealer compromises digital security by illicitly acquiring sensitive user data. This sophisticated malicious software operates as a Malware-as-a-Service (MaaS), posing a significant threat to individuals and organizations. It facilitates widespread credential theft and financial exploitation. This report examines Rhadamanthys’ operational mechanisms, its propagation methods, and the broader implications of its activities, including recent efforts…
-

Understanding Package Registry Flooding
Package registry flooding is a cyberattack where threat actors overwhelm software package repositories with fake entries to hide malicious content, erode trust, and create vulnerabilities in the software supply chain. This article details its operation, impact, and mitigation strategies.
-

Digital Services Act (DSA)
The European Union (EU) introduced the Digital Services Act (DSA) to establish a secure, accountable online environment. The DSA, alongside the Digital Markets Act (DMA), safeguards users’ fundamental rights and fosters a competitive landscape within the European Single Market and globally.
-

FPV Drones in Modern Warfare
Explore the critical role of First-Person View (FPV) drones in modern warfare, their tactical superiority, and their impact on cyber and electronic warfare, including training and counter-drone measures.
