Blog

Threathunt 2030 (ENISA)

Actualités
2024 edition of the Threathunt 2030 conference, the ENISA flagship conference focused on the emerging cybersecurity threats of the future and on how the Union and Member States can best foresee, identify, prevent and respond to future challenges.
Read More

Chinese Hackers Exploiting Cisco Switches Zero-Day to Deliver Malware

Actualités
A China-nexus cyber espionage group named Velvet Ant has been observed exploiting a zero-day flaw in Cisco NX-OS Software used in its switches to deliver malware. The vulnerability, tracked as CVE-2024-20399 (CVSS score: 6.0), concerns a case of command injection that allows an authenticated, local attacker to execute arbitrary commands as root on the underlying operating system of an affected
Read More

Meta’s ‘Pay or Consent’ Approach Faces E.U. Competition Rules Scrutiny

Actualités
Meta's decision to offer an ad-free subscription in the European Union (E.U.) has faced a new setback after regulators accused the social media behemoth of breaching the bloc's competition rules by forcing users to choose between seeing ads or paying to avoid them. The European Commission said the company's "pay or consent" advertising model is in contravention of the Digital Markets Act (DMA).
Read More

Australian Man Charged for Fake Wi-Fi Scam on Domestic Flights

Actualités
An Australian man has been charged with running a fake Wi-Fi access point during a domestic flight with an aim to steal user credentials and data. The unnamed 42-year-old "allegedly established fake free Wi-Fi access points, which mimicked legitimate networks, to capture personal data from unsuspecting victims who mistakenly connected to them," the Australian Federal Police (AFP) said in a press
Read More

Critical Flaws in CocoaPods Expose iOS and macOS Apps to Supply Chain Attacks

Actualités
A trio of security flaws has been uncovered in the CocoaPods dependency manager for Swift and Objective-C Cocoa projects that could be exploited to stage software supply chain attacks, putting downstream customers at severe risks. The vulnerabilities allow "any malicious actor to claim ownership over thousands of unclaimed pods and insert malicious code into many of the most popular iOS and
Read More