-
American Radio Relay League Paid $1 Million Ransom
The American Radio Relay League (ARRL), a prominent national association for amateur radio enthusiasts, recently confirmed that it paid a staggering $1 million ransom to cybercriminals. ARRL Hit by Cyber Attack ARRL found itself at the mercy of a sophisticated ransomware attack. Upon realizing the severity of the attack, the ARRL was left with limited…
-
What is meant by “cybersecurity”?
The process of protecting networks, computers, servers, mobile devices, electronic systems, and data from malicious attacks is known as cybersecurity. It is also referred to as electronic information security or information technology security. The term can be categorized into a few common categories and is used in various contexts, including business and mobile computing. The…
-
What is Malware and its types?
The term “malicious software” is shortened to “malware.” Malware is invasive software that is purposefully created to harm computers and computer networks. On the other hand, software that unintentionally causes harm is typically called a software bug. Occasionally, inquiries are made regarding the distinction between malware and viruses. The distinction is that ransomware, which encompasses…
-
What is the Dark web?
A portion of the internet known as the “dark web” cannot be found by search engines and must be accessed through the use of the anonymizing browser Tor. A portion of the internet known as the “dark web” is not indexed by search engines. You’ve likely heard of the “dark web” being a hub for…
-
Analysis of Rhadamanthys Malware
In the final quarter of 2022, the infostealer malware, Rhadamanthys, was found. Given that it could target browser extensions and wallet clients installed on the victim’s computer, its capabilities demonstrated a particular interest in cryptocurrency wallets. The primary means of distribution for this threat that have been noticed are phishing emails and phony software websites…
-
Understanding Signaling System 7 (SS7)
The Signaling System 7 (SS7) is a set of protocol suite telecommunication networks used to share information across the global public switched telephone network (PSTN). It was developed in the 1980s and has been used ever since. The SS7 protocol is crucial to the functioning of telecom networks, as it helps to set up and…
-
Top 5 Open Source Firewall for Network Security
A firewall is a security system that is used to control network traffic and prevent unauthorized access to a network. It acts as a machinery between a private network and the internet, allowing only authorized traffic to go through. Firewalls have evolved from simple packet filters to modern Next-Generation Firewalls with advanced features. Firewalls can…
-
CVE-2025-21617 – Guzzle OAuth Subscriber Low-Entropy Nonce Generation Vulnerability
CVE ID : CVE-2025-21617 Published : Jan. 6, 2025, 8:15 p.m. | 44 minutes ago Description : Guzzle OAuth Subscriber signs Guzzle requests using OAuth 1.0. Prior to 0.8.1, Nonce generation does not use sufficient entropy nor a cryptographically secure pseudorandom source. This can leave servers vulnerable to replay attacks when TLS is not used. This…
-
CVE-2024-55408 – ASUS System Analysis IO Arbitrary Read and Write Vulnerability
CVE ID : CVE-2024-55408 Published : Jan. 6, 2025, 7:15 p.m. | 1 hour, 45 minutes ago Description : An issue in the AsusSAIO.sys component of ASUS System Analysis IO v1.0.0 allows attackers to perform arbitrary read and write actions via supplying crafted IOCTL requests. Severity: 0.0 | NA Visit the link for more details, such as…
-
CVE-2024-55074 – Grocy Stored XSS Privilege Escalation Vulnerability
CVE ID : CVE-2024-55074 Published : Jan. 6, 2025, 8:15 p.m. | 44 minutes ago Description : The edit profile function of Grocy through 4.3.0 allows stored XSS and resultant privilege escalation by uploading a crafted HTML or SVG file, a different issue than CVE-2024-8370. Severity: 0.0 | NA Visit the link for more details, such…