Headlines
Exploring the Vulnerabilities: Hijacking and Disrupting Socomec UPS Deviceswordpress,vulnerabilities,hijacking,disrupting,SocomecUPSdevices

Exploring the Vulnerabilities: Hijacking and Disrupting Socomec UPS Devices

Report: ICS/OT Vulnerabilities Allow Hackers to Hijack, Disrupt Socomec UPS Devices Introduction A researcher has discovered seven vulnerabilities in uninterruptible power supply (UPS) products made by Socomec, a France-based electrical equipment manufacturing company. These vulnerabilities can be exploited by hackers to hijack and disrupt the devices. The impacted product, MODULYS GP (MOD3GP-SY-120K), has reached end-of-life,…

Read More
Millions of Repos on GitHub: A Looming Hijacking Crisisgithub,repositories,hijacking,crisis

Millions of Repos on GitHub: A Looming Hijacking Crisis

Millions of Enterprise Software Repositories on GitHub Vulnerable to Repojacking Name-Change Risks Millions of enterprise software repositories on GitHub are susceptible to repojacking, a type of software supply chain attack. Researchers at Aqua Security have highlighted the vulnerability, which allows threat actors to redirect projects dependent on a specific repository to a malicious one instead….

Read More
"Cyber Threat Group Exploits Azure Serial Console for Complete Virtual Machine Hijacking"azure,cyberthreat,virtualmachine,hijacking,serialconsole,exploit

“Cyber Threat Group Exploits Azure Serial Console for Complete Virtual Machine Hijacking”

Perimeter 81: A Comprehensive Network Security Solution Protecting Your Business in the Age of Cyber Attacks Cybersecurity is no longer a luxury but a necessity for businesses, especially in times when remote work and cloud computing have opened up more avenues for cybercriminals to exploit. The increase in cyber threats, such as malware, hacking, and…

Read More