Law firms are increasingly becoming targets for cybercriminals, who are looking to steal confidential information and use it for financial gain or extortion. These attacks are carried out through various tactics such…
Category: English
Critical Flaw in Cisco IP Phone Series
A critical vulnerability has been discovered in the Cisco IP Phone Series that could allow attackers to remotely execute code and gain full control of the affected device. The vulnerability, tracked as…
BlackLotus Bootkit Bypasses UEFI Security
Kaspersky researchers have discovered the first-known bootkit specifically designed to target the Unified Extensible Firmware Interface (UEFI) of a computer’s firmware. Dubbed “BlackLotus,” the bootkit is capable of bypassing security measures like…
Cybersecurity: 9 out of 10 Employees Overestimate Their Skills
According to a new survey by the cybersecurity firm Tessian. The survey, which included over 4,000 employees across the US, UK, and Europe, found that despite 92% of employees claiming to have…
Global Firms Face Rising Cyber Threats
According to a new survey by the cybersecurity firm Sophos, 32% of global companies are expected to experience a cybersecurity attack in 2022. The report, which surveyed over 5,400 IT decision-makers in…
Security Flaw in US Federal Government’s Email System Puts Sensitive Information at Risk
A security flaw has been found in the US federal government’s secure email system, which could enable hackers to intercept and read sensitive information. The issue relates to the encryption protocol used…
NewFixs Malware Targets ATMs in Mexico, Posing a Threat to Financial Security
A new ATM malware called NewFixs is targeting banks in Mexico. This malware can evade antivirus software, firewalls, and intrusion detection systems to infect ATMs. Once installed, the malware can capture personal…
A New Malware Exploiting Facebook to Steal Sensitive Data
There’s a new type of malware called Sys01Stealer that’s using Facebook to spread itself. The malware is programmed to collect sensitive data such as passwords, usernames, and credit card details from infected…