Hackers are exploiting a critical vulnerability in Cleo’s file transfer software, impacting enterprises globally. The flaw, tracked as CVE-2024-50623, affects Cleo’s Harmony, VLTrader, and LexiCom products, widely used for managing secure data transfers. Cybersecurity firm Huntress revealed that
Latest News
Cybersecurity Researcher, Jeremiah Fowler, discovered and reported to vpnMentor about a non-password-protected database that contained more than 4.8 million records belonging to Care1 — a Canadian company offering AI software solutions to support optometrists in delivering enhanced patient
Pegasus spyware, created by the Israeli firm NSO Group, has been identified on a growing number of smartphones worldwide. It targets individuals ranging from journalists and activists to business leaders and government officials. A report by mobile security company iVerify uncovered seven
NordVPN and FlashRouters have announced the release of the Privacy Hero 2, the first router with native support for NordLynx, NordVPN’s proprietary VPN protocol. The announcement was made on December 4, 2024, and these new VPN-integrated routers are already available for purchase. FlashRouters
Independent cybersecurity experts Noam Rotem and Ran Locar have uncovered and reported to vpnMentor a cyber operation that exploited vulnerabilities in public sites, leading to unauthorized access to sensitive customer data, infrastructure credentials, and proprietary source code. This report
A South Korean CEO and five employees were arrested for manufacturing and exporting satellite receivers equipped with Distributed Denial of Service (DDoS) functionalities. This action violated the country’s Act on Promotion of Information and Communications Network Utilization and Information
A new phishing-as-a-service (PhaaS) platform, known as Rockstar 2FA, is enabling adversary-in-the-middle (AiTM) attacks to steal Microsoft 365 credentials and bypass multifactor authentication (MFA). Specifically, AiTM phishing is a technique that uses specialized tools to allow a threat actor to
India’s Department of Telecommunications (DoT) recently introduced the Telecommunications (Telecom Cyber Security) Rules, 2024, under the Telecom Act, 2023, to fortify telecom infrastructure against cyber threats. However, experts argue these measures lack sufficient safeguards for user privacy
A major cyberattack has disrupted operations at the Wirral University Teaching Hospital (part of the NHS Foundation Trust), forcing the postponement of surgeries, outpatient appointments, and other procedures. The WUTH is a healthcare organization which operates Arrowe Park, Clatterbridge, and
A North Korea-linked hacking group, Sapphire Sleet, has stolen more than $10 million in cryptocurrency over six months through LinkedIn scams and AI-driven malware. The group, active since 2020, exploits fake profiles to execute sophisticated social engineering campaigns targeting professionals