Security Guard Magazine
    Thumbnail
    cybersecurity botnet CISA

    Massive Botnet Deploys 2.8M IPs in Global VPN Infrastructure Attack

    February 12, 2025 • 1 min read

    A massive cyber attack campaign utilizing 2.8 million compromised IP addresses is targeting major VPN and security devices worldwide through automated brute force attempts. The attack, largely originating from US-based IPs, employs a botnet of hijacked consumer routers to route malicious traffic through organizational networks.

    Thumbnail
    Chrome cybersecurity malware Google

    Browser Syncjacking: The New Chrome Extension Attack That Gives Hackers Full Device Control

    February 11, 2025 • 1 min read

    A dangerous new cyberattack method called 'browser syncjacking' exploits Chrome extensions to give attackers complete control of victims' computers. The attack uses legitimate-looking extensions and Google sync features to steal sensitive data and establish backdoor access.

    Thumbnail
    DeepSeek China US cybersecurity

    US Lawmakers Move to Ban Chinese AI App DeepSeek from Government Devices

    February 07, 2025 • 1 min read

    A bipartisan bill aims to prohibit federal employees from using DeepSeek on government devices due to national security concerns about data collection by China. The legislation follows discoveries of code that could transmit user data to China Telecom and mirrors similar restrictions in other countries.

    Thumbnail
    cybersecurity US vulnerability

    U.S. Government Reveals Record of 39 Zero-Day Vulnerability Disclosures in Landmark Transparency Report

    February 06, 2025 • 1 min read

    The U.S. Office of the Director of National Intelligence released its first-ever public report detailing the disclosure of 39 zero-day software vulnerabilities in 2023. This unprecedented transparency offers insight into how the government balances national security with software security through its Vulnerabilities Equities Process.

    Thumbnail
    Baltic Russia cybersecurity EU

    Baltic Nations Bolster Cyber Defenses Ahead of Russian Power Grid Separation

    February 06, 2025 • 1 min read

    Lithuania, Latvia, and Estonia are strengthening cybersecurity measures as they prepare to disconnect from the Soviet-era BRELL power network shared with Russia. The Baltic states anticipate potential retaliation from Moscow while transitioning to the EU electricity system on February 9.

    Thumbnail
    AWS cybersecurity malware supply chain

    Hijacked AWS Storage Buckets Expose Major Organizations to Supply Chain Attacks

    February 06, 2025 • 1 min read

    Security researchers discovered 150 abandoned AWS S3 storage buckets previously used by major organizations that could be easily re-registered and hijacked. The vulnerability allowed researchers to gain control over storage locations still receiving millions of requests from government agencies and corporations.

    Thumbnail
    Okta Bcrypt API cybersecurity

    Okta Bcrypt Vulnerability Exposes Critical API Design Flaws

    February 05, 2025 • 1 min read

    A security incident at Okta revealed how Bcrypt's 72-character input limitation could be exploited to bypass authentication in certain conditions. The case highlights crucial lessons for modern API design, emphasizing explicit input validation over silent modifications.

    Thumbnail
    Microsoft phishing ADFS cybersecurity

    Cybercriminals Target Organizations with Sophisticated ADFS Phishing Scheme

    February 05, 2025 • 1 min read

    Security researchers have uncovered a sophisticated phishing campaign targeting organizations using Microsoft ADFS, with attackers creating convincing fake login portals to steal credentials and bypass MFA. The scam has affected over 150 organizations across education, healthcare, government and technology sectors, primarily in the US, Canada, Australia and Europe.

    Thumbnail
    Treasury OPM cybersecurity privacy

    Security Experts Alarmed as DOGE Gains Unprecedented Access to Federal Systems

    February 05, 2025 • 1 min read

    Cybersecurity professionals raise red flags over security breaches as Elon Musk's Department of Government Efficiency obtains access to sensitive Treasury and OPM systems. Growing concerns emerge about data exposure and employee safety as protests mount against controversial security protocol violations.

    Thumbnail
    cybersecurity malware IoT hardware

    Hidden Threat: Security Expert Exposes Dangerous Vulnerability in Modified USB Cables

    February 05, 2025 • 1 min read

    Cybersecurity researcher Mike Grover demonstrates how a seemingly innocent charging cable can be weaponized to remotely access and control computers from up to 300 feet away. The modified cable can capture keystrokes, implant malware, and execute malicious commands without detection.

  • Previous
  • 5
  • 6
  • 7
  • 8
  • 9
  • Next

Free Security Guards Resource and Information Magazine