مقالات

مقالات
United Kingdom Introduces New Cybersecurity Assessment Initiatives

The UK has introduced a series of new cybersecurity assessment initiatives aimed at advancing the principles of “secure by design.”…

مقالات
Threat Actors Exploit Vulnerability in Samsung MagicInfo System

Administrators of Samsung MagicInfo 9 Server are advised to isolate their systems from the internet following the discovery of exploit…

مقالات
#Addressing Deepfake Threats in the Era of AI Agents

After years of generative AI adoption, the initial excitement around the technology has subsided, leading both attackers and defenders to…

مقالات
Russian Threat Actors Deploy New LOSTKEYS Malware via ClickFix Fake CAPTCHA Techniques

The Russia-associated threat actor known as COLDRIVER is actively distributing a new type of malware identified as LOSTKEYS, as part…

مقالات
Cisco Addresses Critical Vulnerability CVE-2025-20188 (CVSS 10.0) in IOS XE, Enabling Root Exploits through JWT

Cisco has issued software updates to rectify a critical security vulnerability in its IOS XE Wireless Controller. This flaw, identified…

مقالات
Official Advisory for Individuals Impacted by an Information Security Incident in the Social Services, Health Care, and Emergency Services Division of Helsinki

An internal information security breach has been detected within the Social Services, Health Care and Rescue Services Division of Helsinki….