Security
Headlines
HeadlinesLatestCVEs

Latest News

SquareX Researchers Expose OAuth Attack on Chrome Extensions Days Before Major Breach

Palo Alto, Calif., USA, 30th December 2024, CyberNewsWire

HackRead
#web#mac#google#git#oauth#auth#zero_day#chrome
How to Get the Most Out of Cyber Insurance

Cyber insurance should augment your cybersecurity strategy — not replace it.

ABB Cylon Aspect 3.08.02 (ethernetUpdate.php) Authenticated Path Traversal

The ABB Cylon controller suffers from an authenticated path traversal vulnerability. This can be exploited through the 'devName' POST parameter in the ethernetUpdate.php script to write partially controlled content, such as IP address values, into arbitrary file paths, potentially leading to configuration tampering and system compromise including denial of service scenario through ethernet configuration backup file overwrite.

ABB Cylon Aspect 3.08.02 (ethernetUpdate.php) Authenticated Path Traversal

The ABB Cylon controller suffers from an authenticated path traversal vulnerability. This can be exploited through the 'devName' POST parameter in the ethernetUpdate.php script to write partially controlled content, such as IP address values, into arbitrary file paths, potentially leading to configuration tampering and system compromise including denial of service scenario through ethernet configuration backup file overwrite.

What Security Lessons Did We Learn in 2024?

Proactive defenses, cross-sector collaboration, and resilience are key to combating increasingly sophisticated threats.

Exposed Cloud Server Tracks 800,000 Volkswagen, Audi, and Skoda EVs

SUMMARY A recent report from the German news outlet Spiegel has revealed a significant security breach impacting hundreds…

New HIPAA Rules Mandate 72-Hour Data Restoration and Annual Compliance Audits

The United States Department of Health and Human Services' (HHS) Office for Civil Rights (OCR) has proposed new cybersecurity requirements for healthcare organizations with an aim to safeguard patients' data against potential cyber attacks. The proposal, which seeks to modify the Health Insurance Portability and Accountability Act (HIPAA) of 1996, is part of a broader initiative to bolster the

⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips

Every week, the digital world faces new challenges and changes. Hackers are always finding new ways to breach systems, while defenders work hard to keep our data safe. Whether it's a hidden flaw in popular software or a clever new attack method, staying informed is key to protecting yourself and your organization. In this week's update, we'll cover the most important developments in

The Most Dangerous People on the Internet in 2024

From Elon Musk and Donald Trump to state-sponsored hackers and crypto scammers, this was the year the online agents of chaos gained ground.

When Good Extensions Go Bad: Takeaways from the Campaign Targeting Browser Extensions

News has been making headlines over the weekend of the extensive attack campaign targeting browser extensions and injecting them with malicious code to steal user credentials. Currently, over 25 extensions, with an install base of over two million users, have been found to be compromised, and customers are now working to figure out their exposure (LayerX, one of the companies involved in