Top Password Used By IT Admins is admin

The password admin has been found to be the top password used by IT administrators. Security researchers have discovered that IT administrators are using weak passwords to protect access to portals, providing easy access to attackers to enterprise networks. An...

Malicious Red Alert App Spying on Israelis

Malicious version of the Israeli incoming airstrike warning app have been found distributed over internet. Red Alert is a legitimate app used by Israeli citizens to receive notifications of incoming rocket attacks. The app’s popularity has soared since the...

Over 10,000 Cisco Devices Hacked

Attackers are actively exploiting a zero day vulnerability in cisco devices to gain full administrative privileges and take complete control of the device remotely. Cisco has warned of a maximum severity authentication bypass zero-day vulnerability in its IOS XE...

Queensland Introduces Mandatory Data Breach Notification

The Queensland government has introduced legislation for data breach notification, joining NSW as the only other state to introduce such a scheme. There was a review done over a year ago into the culture and accountability of the Queensland government. One of the...

Curl Patches Worst Security Flaw in Ages

Patches have been released for two security vulnerabilities affecting the curl data transfer library, one of which could potentially result in code execution. Earlier this week, the maintainers of curl announced that two vulnerabilities would be announced later during...

Linux Distributions Vulnerable to Looney Tunables

A new Linux vulnerability, known as the Looney Tunables impacts most Linux distributions and allows attackers to gain administrative root privileges. The vulnerability, discovered by security researchers, is due to a weakness in the GNU C Library’s ld.so dynamic...

ShellTorch Flaw Affecting Open Source AI Servers

Multiple critical vulnerabilities in the open-source TorchServe AI model-serving tool, potentially exposes tens of thousands of internet-exposed servers to remote code execution. Security researchers have disclosed multiple critical vulnerabilities in the TorchServe...