Cybersecurity

Oracle Releases January 2025 Patch to Address 318 Flaws Across Major Products 

Oracle Releases January 2025 Patch to Address 318 Flaws Across Major Products 

Oracle is urging customers to apply its January 2025 Critical Patch Update (CPU) to address 318 new security vulnerabilities spanning its products and services.
The most severe of the flaws is a bug in the Oracle Agile Product Lifecycle Management (PLM) Framework (CVE-2025-21556, CVSS score: 9.9) that could allow an attacker to seize control of susceptible instances.
“Easily exploitable

Mirai Botnet Launches Record 5.6 Tbps DDoS Attack with 13,000+ IoT Device 

Mirai Botnet Launches Record 5.6 Tbps DDoS Attack with 13,000+ IoT Device 

Web infrastructure and security company Cloudflare on Tuesday said it detected and blocked a 5.6 Terabit per second (Tbps) distributed denial-of-service (DDoS) attack, the largest ever attack to be reported to date.
The UDP protocol-based attack took place on October 29, 2024, targeting one of its customers, an unnamed internet service provider (ISP) from Eastern Asia. The activity originated

The AI Fix #34: Fake Brad Pitt and why AI means we will lose our jobs 

The AI Fix #34: Fake Brad Pitt and why AI means we will lose our jobs 

In episode 34 of The AI Fix, our hosts watch in horror as a vacuum cleaner sprouts a robotic arm and legs, a rivet embedded in the side of your head claims it will be able to read your mind and chat up French girls, a robot dog runs much quicker than you ever will, and AI podcast hosts get impatient with their listeners. Meanwhile Graham isn’t tempted by NVIDIA’s $3000 supercomputer, and Mark explains his emergency manoeuvre for avoiding karaoke.

Graham shares a heartbreaking tale of a French woman’s encounter with someone who owns a copy of Photoshop, and Mark looks into the disturbing impact AI is going to have on our careers.

All this and much more is discussed in the latest edition of “The AI Fix” podcast by Graham Cluley and Mark Stockley.

Mirai Variant Murdoc_Botnet Exploits AVTECH IP Cameras and Huawei Routers 

Mirai Variant Murdoc_Botnet Exploits AVTECH IP Cameras and Huawei Routers 

Cybersecurity researchers have warned of a new large-scale campaign that exploits security flaws in AVTECH IP cameras and Huawei HG532 routers to rope the devices into a Mirai botnet variant dubbed Murdoc_Botnet.
The ongoing activity “demonstrates enhanced capabilities, exploiting vulnerabilities to compromise devices and establish expansive botnet networks,” Qualys security researcher Shilpesh

13,000 MikroTik Routers Hijacked by Botnet for Malspam and Cyberattacks 

13,000 MikroTik Routers Hijacked by Botnet for Malspam and Cyberattacks 

A global network of about 13,000 hijacked Mikrotik routers has been employed as a botnet to propagate malware via spam campaigns, the latest addition to a list of botnets powered by MikroTik devices.
The activity “take[s] advantage of misconfigured DNS records to pass email protection techniques,” Infoblox security researcher David Brunsdon said in a technical report published last week. “This

Ex-CIA Analyst Pleads Guilty to Sharing Top-Secret Data with Unauthorized Parties 

Ex-CIA Analyst Pleads Guilty to Sharing Top-Secret Data with Unauthorized Parties 

A former analyst working for the U.S. Central Intelligence Agency (CIA) pleaded guilty to transmitting top secret National Defense Information (NDI) to individuals who did not have the necessary authorization to receive it and attempted to cover up the activity.
Asif William Rahman, 34, of Vienna, was an employee of the CIA since 2016 and had a Top Secret security clearance with access to

HackGATE: Setting New Standards for Visibility and Control in Penetration Testing Projects 

HackGATE: Setting New Standards for Visibility and Control in Penetration Testing Projects 

Imagine receiving a penetration test report that leaves you with more questions than answers. Questions like, “Were all functionalities of the web app tested?” or ” Were there any security issues that could have been identified during testing?” often go unresolved, raising concerns about the thoroughness of the security testing. This frustration is common among many security teams. Pentest

PNGPlug Loader Delivers ValleyRAT Malware Through Fake Software Installers 

PNGPlug Loader Delivers ValleyRAT Malware Through Fake Software Installers 

Cybersecurity researchers are calling attention to a series of cyber attacks that have targeted Chinese-speaking regions like Hong Kong, Taiwan, and Mainland China with a known malware called ValleyRAT.
The attacks leverage a multi-stage loader dubbed PNGPlug to deliver the ValleyRAT payload, Intezer said in a technical report published last week.
The infection chain commences with a phishing

CERT-UA Warns of Cyber Scams Using Fake AnyDesk Requests for Fraudulent Security Audits 

CERT-UA Warns of Cyber Scams Using Fake AnyDesk Requests for Fraudulent Security Audits 

The Computer Emergency Response Team of Ukraine (CERT-UA) is warning of ongoing attempts by unknown threat actors to impersonate the cybersecurity agency by sending AnyDesk connection requests.
The AnyDesk requests claim to be for conducting an audit to assess the “level of security,” CERT-UA added, cautioning organizations to be on the lookout for such social engineering attempts that seek to

CALL US TODAY TO SPEAK TO A SECURITY EXPERT: 720.221.6804

X