On September 24, 2024, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a new critical vulnerability to its Known Exploited Vulnerabilities Catalog. The vulnerability, identified as CVE-2024-7593, affects Ivanti’s...
At InnoTrans 2024, two global giants—Alstom and Airbus—announced a pivotal partnership aimed at revolutionizing cybersecurity in the transportation sector. This collaboration is not only a significant advancement in securing critical...
As drone usage surges across industries—from agriculture to defense—the importance of drone cybersecurity has never been more critical. Mobilicom, a global leader in cybersecurity and drone communication solutions, is at...
As cyber threats become more sophisticated and widespread, governments worldwide are stepping in to introduce stricter regulations to protect critical industries. In the European Union (EU), two groundbreaking pieces of...
In 2024, polymorphic and metamorphic malware have emerged as some of the most advanced and challenging threats in the cybersecurity landscape. These types of malware continually modify their code, making...
As of September 18, 2024, the rapid adoption of generative AI (GenAI) applications is presenting significant challenges for cybersecurity and data privacy. GenAI, known for its ability to produce realistic...
On September 18, 2024, VMware announced a patch for a critical remote code execution (RCE) vulnerability discovered during a Chinese hacking contest. This vulnerability, assigned a severity score of 9.8/10,...
On September 13, 2024, Apple released a critical security patch for its Vision Pro mixed-reality headset, addressing a vulnerability that could allow attackers to exploit the device’s gaze-tracking technology. Dubbed...
In a significant move within the cybersecurity and legal realms, Apple has dropped its lawsuit against NSO Group, the controversial Israeli tech company behind the Pegasus spyware. Filed in 2021,...
Microsoft recently disclosed a critical zero-day vulnerability in its Windows Update process, and it’s already being actively exploited in the wild. This vulnerability, which allows attackers to roll back security...