BBC News - World
-
Senate Republicans block Ukraine aid bill
Security aid is in jeopardy as US Republicans insist on new US-Mexico border security measures.
-
Brazil deploys troops to Venezuela border
Soldiers are deploying, days after Venezuela announces plans to take over part of Guyana.
-
US grounds entire Osprey fleet after fatal crash in Japan
The move comes after eight service members died in a crash off the coast of Japan last week.
-
Putin makes rare foreign trip to Gulf states
Russia's leader visits the UAE and Saudi Arabia for talks expected to include the Gaza and Ukraine wars.
-
Republican candidates largely duck Trump attacks in final debate
Only former New Jersey Governor Chris Christie sought to attack the Republican frontrunner.
-
Alberto Fujimori: Peru's ex-president freed after 15 years in jail
Alberto Fujimori, Peru's divisive former leader, is pardoned over corruption and human rights violations.
-
Former professor suspected of US college shooting
The gunman was killed by police after opening fire at the Las Vegas campus of the University of Nevada.
-
Mine explosion: Colombian authorities blow up illegal sites
Colombia and Brazil destroy 19 illegal gold mining sites and equipment in the Amazon rainforest.
-
Ukraine claims killing of 'traitor' ex-MP Illya Kyva in Russia
Illya Kyva was shot dead in a special operation by Ukraine's SBU security service, sources tell the BBC.
-
Wieambilla shootings: US arrests man over Australian religious terror attack
He is alleged to have links to Christian extremists who killed two police officers and another man.
-
Alert: Threat Actors Can Leverage AWS STS to Infiltrate Cloud Accounts
Threat actors can take advantage of Amazon Web Services Security Token Service (AWS STS) as a way to infiltrate cloud accounts and conduct follow-on attacks. The service enables threat actors to impersonate user identities and roles in cloud environments, Red Canary researchers Thomas Gardner and Cody Betsworth said in a Tuesday analysis. AWS STS is a web service that enables
-
New Report: Unveiling the Threat of Malicious Browser Extensions
Compromising the browser is a high-return target for adversaries. Browser extensions, which are small software modules that are added to the browser and can enhance browsing experiences, have become a popular browser attack vector. This is because they are widely adopted among users and can easily turn malicious through developer actions or attacks on legitimate extensions. Recent incidents like
-
Sierra:21 - Flaws in Sierra Wireless Routers Expose Critical Sectors to Cyber Attacks
A collection of 21 security flaws have been discovered in Sierra Wireless AirLink cellular routers and open-source software components like TinyXML and OpenNDS. Collectively tracked as Sierra:21, the issues expose over 86,000 devices across critical sectors like energy, healthcare, waste management, retail, emergency services, and vehicle tracking to cyber threats, according
-
Scaling Security Operations with Automation
In an increasingly complex and fast-paced digital landscape, organizations strive to protect themselves from various security threats. However, limited resources often hinder security teams when combatting these threats, making it difficult to keep up with the growing number of security incidents and alerts. Implementing automation throughout security operations helps security teams alleviate
-
Hackers Exploited ColdFusion Vulnerability to Breach Federal Agency Servers
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) warned of active exploitation of a high-severity Adobe ColdFusion vulnerability by unidentified threat actors to gain initial access to government servers. "The vulnerability in ColdFusion (CVE-2023-26360) presents as an improper access control issue and exploitation of this CVE can result in arbitrary code execution,"