Tag

Defense

Chinese UNC5174 Adopts New Tools, C2 Infrastructure for Cyber Attacks
Cyber Security
Chinese UNC5174 Adopts New Tools, C2 Infrastructure for Cyber Attacks

Cybersecurity researchers have uncovered a significant evolution in the tactics of the Chinese threat group UNC5174, which has incorporated a new open-source tool and command-and-control (C2) infrastructure into their malicious operations. The group, known for targeting government institutions and critical infrastructure across Southeast Asia and North America, has expanded its arsenal with a modified version of an open-source remote access

Read More
Urgent Patch Required: Windows NTLM Flaw Exploited in Recent Attacks
Cyber Security
Urgent Patch Required: Windows NTLM Flaw Exploited in Recent Attacks

Recent developments in cybersecurity have highlighted a worrying trend with the Windows New Technology LAN Manager (NTLM) protocol. The vulnerability, tracked as CVE-2025-24054, has been actively exploited, prompting the U.S. Cybersecurity and Infrastructure Security Agency (CISA) to add it to their Known Exploited Vulnerabilities (KEV) catalog. With a CVSS score of 6.5, this medium-severity flaw involves NTLM hash disclosure via

Read More
AI Pioneer Georgios Karantonis Advances Secure Surveillance Systems
AI and ML
AI Pioneer Georgios Karantonis Advances Secure Surveillance Systems

Georgios Karantonis has emerged as a key figure in the field of artificial intelligence at a young age. His groundbreaking work focuses on creating robust and secure surveillance systems that can withstand manipulative attacks. This article delves into his contributions, highlighting his academic and professional journey, the innovations he has developed, and their implications for national security and public safety.

Read More
How is the Interlock Ransomware Threat Evolving in 2025?
Cyber Security
How is the Interlock Ransomware Threat Evolving in 2025?

In recent years, cybersecurity experts have increasingly focused on a sophisticated ransomware threat known as Interlock, identifying its first appearance in September 2024. Interlock employs a multi-stage attack chain that targets unsuspecting users through compromised legitimate websites, delivering fake browser updates. This ransomware has affected companies across various sectors in North America and Europe, indicating a non-specific approach regarding industry

Read More
How Will 5G Slice Handover Revolutionize Military Communications?
Networking
How Will 5G Slice Handover Revolutionize Military Communications?

The recent groundbreaking demonstration by Nokia, Telia, and the Finnish Defense Forces has introduced a novel 5G network slicing capability that featured the first seamless 5G standalone slice handover across different countries through a live network. This monumental trial, conducted in Finland during a Nordic exercise this year, showcased robust, uninterrupted, and secure data connections over a 5G standalone slice

Read More
Funding Crisis Threatens Future of Crucial CVE Cybersecurity Program
Cyber Security
Funding Crisis Threatens Future of Crucial CVE Cybersecurity Program

The future of the Common Vulnerabilities and Exposures (CVE) program is in jeopardy due to unexpected funding challenges. Managed by the federal contractor Mitre, the CVE program has become a cornerstone of cybersecurity efforts worldwide. However, these funding hurdles threaten to disrupt the program’s vital operations, raising concerns within the global cybersecurity community. The prospect of service disruptions has sounded

Read More
How Can Edge Computing Solve Cloud’s Biggest Challenges?
Cloud
How Can Edge Computing Solve Cloud’s Biggest Challenges?

The rapid rise of cloud computing revolutionized data management for numerous organizations by promising unprecedented agility, scalability, and convenience. Yet, as more businesses integrate cloud solutions into their operations, they repeatedly face a trifecta of challenges: cost unpredictability, security vulnerabilities, and concerns over operational resilience. These obstacles force enterprises to seek alternatives or complementary approaches that can better accommodate their

Read More
Nokia, Telia, and FDF Achieve 5G Slice Handover Across Borders
Networking
Nokia, Telia, and FDF Achieve 5G Slice Handover Across Borders

The recent successful trial of 5G standalone slice handover conducted by Nokia, Telia, and the Finnish Defence Forces (FDF) marks a significant milestone in the realm of 5G technology. This groundbreaking demonstration shows the immense potential of 5G technology in providing continuous, secure, and reliable communications, especially crucial for defense units operating in coalition environments. Held in Finland, this trial

Read More
Nokia, Telia, and Finnish Military Achieve 5G Slice Handover Milestone
Networking
Nokia, Telia, and Finnish Military Achieve 5G Slice Handover Milestone

In a groundbreaking achievement for telecommunications and defense communications, Nokia, Telia, and the Finnish Defense Forces successfully executed the world’s first seamless 5G Standalone (SA) slice handover between different countries using live commercial networks. This trial, conducted in Finland as part of a Nordic military exercise, demonstrated the ability to maintain continuous and secure data connections over a 5G SA

Read More
Kerberos Flaw CVE-2025-29809 in Windows: Patch Urgently Recommended
Cyber Security
Kerberos Flaw CVE-2025-29809 in Windows: Patch Urgently Recommended

A newly discovered vulnerability in Windows Kerberos, identified as CVE-2025-29809, has highlighted severe security concerns for enterprise networks. This flaw permits authorized attackers to bypass security features and gain access to sensitive authentication credentials, potentially leading to significant breaches. Classified as “Important” with a CVSS score of 7.1, the issue was addressed by Microsoft in their latest April Patch Tuesday

Read More
How Can We Combat Advanced Phishing That Targets MFA?
Cyber Security
How Can We Combat Advanced Phishing That Targets MFA?

In recent years, the sophistication of phishing attacks targeting multi-factor authentication (MFA) has seen a dramatic increase, leaving many organizations and individuals vulnerable. These attacks have evolved to bypass security measures that were previously considered robust. Recent updates to the Tycoon2FA phishing kit exemplify this sophistication, as it now targets Microsoft 365 and Gmail accounts more effectively by circumventing MFA.

Read More
How Is IoT-Enabled AI Transforming Data Center Cybersecurity?
Cyber Security
How Is IoT-Enabled AI Transforming Data Center Cybersecurity?

In the rapidly evolving landscape of digital transformation, data center security faces a multitude of new challenges and opportunities. Traditional security models are becoming increasingly obsolete as data centers expand and the number of interconnected devices multiplies. Fueling this evolution, leading expert Mahesh Kolli has spearheaded the integration of artificial intelligence (AI) and real-time monitoring through the use of Internet

Read More