Sudo Vulnerability Discovered, May Exposes Linux Systems

Sudo, the privileged command-line tool often installed on Linux systems, has two local privilege vulnerabilities. 

Increase in Identity-Based Attacks Attributed to Infostealers

Info-stealing malware and advanced phishing kits account for 156% increase in cyberattacks that target user logins.

Nigerian Army Foils Bandit Attacks in Kebbi, Neutralises Dozens

Troops of the 223 Light Battalion of the Nigerian Army, based in Zuru, have successfully repelled a large-scale attack by armed bandits on Ribah town in Danko-Wasagu Local Government Area…

Gunmen Ambush Security Team in Benue, Kill 2 NSCDC Officers, Injure Others

Armed men suspected to be herders have reportedly ambushed a joint security patrol in Benue State, killing two personnel of the Nigeria Security and Civil Defence Corps (NSCDC), injuring three…

psm

Security Through Quality: Navigating the Latest Cybersecurity Executive Order

The recent Executive Order from the Trump Administration, while modifying some prior requirements, underscores a crucial truth: agencies still bear the unchanged responsibility of safeguarding mission and data.

Security Leaders Discuss Marco Rubio AI Imposter

Secretary of State Marco Rubio was recently impersonated via text messages and AI voice messages. 

How to Prevent “Smash & Grab” Cyberattacks

The best way to prevent smash & grab cyberattacks is to safeguard shared drives and implement MFA protection in a timely manner.

Threat Actor Targeting Indian Defense Sector

A threat actor based in Pakistan (APT36) has engaged in a sophisticated cyber-espionage campaign.

OT Security Responsibility Is Elevating to Executive Leadership

New research delves into the state of operational technology (OT) cybersecurity.