Callback Phishing Attacks Using Google Groups To Steal Login Details

Phishing attacks are deceptive schemes where attackers impersonate reputable entities to trick individuals into revealing “sensitive information.” These attacks often occur via email using urgent language to prompt victims to click on “malicious links” or “download harmful attachments.” Trustwave cybersecurity analysts recently warned of Callback Phishing attacks that target Google groups to steal login details. […]

87,000+ FortiOS Devices Vulnerable to Remote Code Execution Attacks

A critical security vulnerability affecting over 87,000 FortiOS devices has been discovered, leaving them exposed to potential remote code execution (RCE) attacks. The flaw, identified as CVE-2024-23113, impacts multiple versions of FortiOS, FortiProxy, FortiPAM, and FortiWeb products. The vulnerability stems from a use of externally-controlled format string in the FortiOS fgfmd daemon, which allows unauthenticated […]

Iran, Russia and North Korea changed cyber attack tactics in the last year, says Microsoft

Microsoft users face more than 600 million cyber attacks every day, partly fuelled by a growing trend of cyber crime gangs working with nation states, according to a new report by the company. In this year’s Digital Defence report, Microsoft said countries like Russia, Iran and North Korea have changed how they worked in the last year, […]

U.S. and Allies Warn of Iranian Cyberattacks on Critical Infrastructure in Year-Long Campaign

Cybersecurity and intelligence agencies from Australia, Canada, and the U.S. have warned about a year-long campaign undertaken by Iranian cyber actors to infiltrate critical infrastructure organizations via brute-force attacks. “Since October 2023, Iranian actors have used brute force and password spraying to compromise user accounts and obtain access to organizations in the healthcare and public […]

Akira Ransomware Actors Developing Rust Variant To Attack ESXi Servers

Akira Ransomware Actors are Developing a Rust Variant to Attack ESXi servers. First identified in March 2023, it targets both Windows and Linux systems. It is first identified in March 2023, targets both “Windows” and “Linux” systems. It employs a double-extortion tactic and has affected numerous organizations, particularly in the U.S. Cybersecurity analysts at Cisco […]

Denmark’s government relaunches digital security initiative to protect business sectors and society at large

The Danish government has relaunched the National Cyber ​​Security Council (NCSC) under the umbrella of a new mission to strengthen the country’s digital security capabilities across all critical areas of the economy and society. The NCSC’s more robust charter aims to enhance the agency’s role as a key adviser to the government on core technology […]

Haunted Tour of TTU Campus

Friday, October 25, 2024, 8pm – 12am oin us for this annual “frightraiser”, presented by the student organization, Raider Power of Paranormal! Sponsored by Military & Veterans Programs, with additional student support from the School of Theatre & Dance. Our haunted tour is a place-based entertainment experience, hosted to amuse attendees with strange tales of a locale’s […]

Tech Folk Orchestra in concert

Wednesday, October 23, 2024, 8 – 9:30pm “THE BABYLON BERLIN RAGAMUFFIN BAND”The Tech Folk Orchestra in ConcertWednesday October 23 8pmHemmle Recital HallAbout this ProgramListening tunes and songs from England, France, Ireland, Northumberland, New England, and Bassanda, with original choreographies and social dances. Featuring special guests the TTU Historical Performance Ensemble and Caprock English Bagpipe Consort, and the […]

How to Start a Career in Web Security

Introduction: Web security, also known as cybersecurity, is a critical field focused on protecting websites, networks, and online data from unauthorized access, attacks, and other security threats. As the digital world grows, so does the demand for skilled web security professionals. In this post, we’ll explore the steps you need to take to start a […]

Real-World Example of Race Condition Exploits “Adding Money”

Hello friends, What is Race condition Race conditions are a type of vulnerability often tied to business logic flaws, arising when websites handle concurrent requests without sufficient protections. This can allow multiple threads to access the same data simultaneously, leading to collisions that trigger unintended application behavior. In a race condition attack, strategically timed requests deliberately […]