news

Over 80,000 Hikvision cameras can be easily hacked
Security researchers from CYFIRMA have discovered over 80,000 Hikvision cameras affected by a critical command

Ring app vulnerability allowed access to private camera recordings
A vulnerability in the Android version of the Ring app, which is used to remotely

> 100 tandartspraktijken met 600.000 patiënten gesloten na cyberaanval
Meer dan honderd tandartspraktijken houden de komende dagen de deuren noodgedwongen dicht. Het gaat om

Twitter confirms data breach with data from 5.4 million users
In an attack on Twitter, data of 5.4 million users was stolen, which was then

Nearly 8.000 wallets with more than $5 million emptied after Solana hack
Nearly 8,000 digital wallets have been drained of just over $5.2 million in digital coins

$190 million stolen via vulnerability in smart contract Nomad
A vulnerability in crypto bridge Nomad caused during maintenance has resulted in the theft of

Hacker scan vulnerable endpoints within 15 minutes of a new disclosed CVE
Hackers are constantly monitoring software vendor bulletin boards for new vulnerability announcements they can leverage

Top 25 Most Dangerous Software Weaknesses
The 2022 Common Weakness Enumeration (CWE™) Top 25 Most Dangerous Software Weaknesses list demonstrates the
Agent- or network-based vulnerability scanning
With remote working now the norm agent-based scanning is becoming a must, while network-based scanning

33% of CISA vulnerabilities from Microsoft affecting 85% of governments
Microsoft’s market dominance creates a big disucssion as they also have the most critical vulnerabilities.

Critical vulnerablity in Citrix Application Delivery Management
Citrix warned customers to deploy security updates that address a critical Citrix Application Delivery Management

Guidance on choosing the right vulnerability scanning tool
This guidance helps SME’s, large organisations and Public Sector bodies to:– understand the basics of