Long-term exposure also appeared in broader vulnerability trends. Nearly 40% of the top-targeted vulnerabilities affected end-of-life devices, and 32% of vulnerabilities were at least 10 years old. These figures point to persistent gaps between vendor lifecycle timelines and enterprise patching practices.
Category: CyberPatriot
US emergency alert systems down after cyberattack • The Register
Various municipalities have issued near-identical advisories about the attack on the OnSolve CodeRED platform, now owned by Crisis24, which enables residents to receive real-time alerts for emergencies such as weather warnings, missing children, terror threats, and more.
Study concludes cybersecurity training doesn’t work | KPBS Public Media
Some people with training were slightly less likely to click on a phishing lure than the untrained. But some trained people were more likely to click.
6 Networking Uses for the Linux nc Command
The netcat tool is quite popular among network administrators. However, it can also serve different purposes for you as a casual Linux user in your day-to-day life. While doing some research, I’ve found some great use cases to play with the nc command.
Pentests once a year? Nope. It’s time to build an offensive SOC
In the real world, adversaries don’t operate in bursts. Their recon is continuous, their tools and tactics are always evolving, and new vulnerabilities are often reverse-engineered into working exploits within hours of a patch release.
So, if your offensive validation isn’t just as dynamic, you’re not just lagging, you’re exposed.
Microsoft says China-backed cybercriminals hacked into US nuclear weapons agency
“The early exploitation resembled government-sponsored activity, and then spread more widely to include hacking that ‘looks like China’,” Meyers told Bloomberg News. CrowdStrike’s investigation into the campaign remains ongoing.
Years-old login credential leads to leak of 270,000 Samsung customer records | CSO Online
At that time, the login credentials were stolen from the computer of an employee of IT service provider Spectos, which offers software to monitor and improve service quality. It is linked to Samsung’s German ticket system at samsung-shop.spectos.com. Apparently, the compromised credentials had not been updated for years.