Tag cybersecurity

As Digital Payments Surge, Here’s How Small Retailers Can Tackle Cybersecurity Threats

Cybersecurity Vulnerabilities: SMEs as Prime Targets Many small and medium-sized enterprises (SMEs) operate under the erroneous belief that their size shields them from the attentions of cybercriminals. This misconception could not be further from the truth. In fact, SMEs are increasingly becoming prime targets for a range of cyber threats,…

Read MoreAs Digital Payments Surge, Here’s How Small Retailers Can Tackle Cybersecurity Threats

Researchers Discover Exploit Bypassing Active Directory Restrictions on NTLMv1

Recent findings by cybersecurity experts have unveiled a considerable vulnerability in the Microsoft Active Directory Group Policy designed to disable the authentication method NT LAN Manager (NTLM) version 1. Researchers indicate that a misconfiguration within on-premises applications is capable of easily bypassing this Group Policy measure. According to Dor Segal,…

Read MoreResearchers Discover Exploit Bypassing Active Directory Restrictions on NTLMv1

Serious Vulnerabilities in WGS-804HPT Switches Allow for Remote Code Execution and Network Exploitation

Planet Technology’s WGS-804HPT Switches Vulnerable to Remote Code Execution Cybersecurity experts have unveiled three critical vulnerabilities in Planet Technology’s WGS-804HPT industrial switches, which could be exploited to facilitate pre-authentication remote code execution. These switches are integral to numerous building and home automation systems, serving a variety of networking functions. Tomer…

Read MoreSerious Vulnerabilities in WGS-804HPT Switches Allow for Remote Code Execution and Network Exploitation

Automotive Titan Stellantis Faces Significant Third-Party Data Breach

NEW You can now listen to Fox News articles! Stellantis, a prominent automotive manufacturer, has confirmed a significant data breach that compromised customer contact information. The intrusion occurred through a third-party platform utilized for customer services in North America. This incident aligns with a series of large-scale cyberattacks targeting cloud-based…

Read MoreAutomotive Titan Stellantis Faces Significant Third-Party Data Breach

Renault Alerts UK Customers About Data Breach Involving Third-Party Supplier

Stolen Data May Fuel Targeted Phishing Campaigns, Experts Caution Renault has informed a number of UK customers that their personal information may have been compromised as a result of a cyberattack on one of its third-party suppliers. The car manufacturer’s notification follows an incident that has raised concerns about the…

Read MoreRenault Alerts UK Customers About Data Breach Involving Third-Party Supplier

Mirai Variant Murdoc Botnet Targets AVTECH IP Cameras and Huawei Routers

Cybersecurity experts have recently identified an extensive campaign designed to exploit vulnerabilities in AVTECH IP cameras and Huawei HG532 routers. This initiative has been largely successful in integrating these devices into a variant of the Mirai botnet known as the Murdoc Botnet. The ongoing operations reflect a significant escalation in…

Read MoreMirai Variant Murdoc Botnet Targets AVTECH IP Cameras and Huawei Routers

Discord Vendor Breach Compromises ID Data in Ransom Attempt

Cybercrime, Fraud Management & Cybercrime, Governance & Risk Management Growing Concerns Over Age Verification Systems as New Targets for Hackers Chris Riotta (@chrisriotta) • October 6, 2025 Image: Shutterstock A recent security breach involving a third-party customer service vendor for Discord has raised alarms among cybersecurity experts, as it appears…

Read MoreDiscord Vendor Breach Compromises ID Data in Ransom Attempt

Red Hat Data Breach Intensifies as ShinyHunters Enters Extortion Efforts

Red Hat, a prominent player in the enterprise software sector, is currently facing extortion threats from a hacking group known as ShinyHunters. The group has made headlines after leaking portions of stolen Customer Engagement Reports (CERs) on a data leak platform. These reports contain sensitive information that could jeopardize the…

Read MoreRed Hat Data Breach Intensifies as ShinyHunters Enters Extortion Efforts