Cyber Threat Intelligence – Alerts

November 11, 2023

Best Practices for Safeguarding Software Supply Chains: Adopting Software Bill of Materials

Cyberattacks in the digital realm aim to disrupt or compromise computing environments, exemplified by incidents like SolarWinds and Log4j exploits. These incidents underscore vulnerabilities in software supply chains affecting both commercial and open source software, […]
October 24, 2023

Mitigating Cisco IOS XE Web UI Vulnerabilities – CVE-2023-20198 and CVE-2023-20273

Tier3 Pakistan and its partners are responding to active, widespread exploitation of two vulnerabilities, CVE-2023-20198 and CVE-2023-20273, affecting Cisco’s Internetworking Operating System (IOS) XE Software Web User Interface (UI). Cisco’s IOS XE Web UI is […]
October 20, 2023

Manipulation and Interference of Information in Pakistan – Cyber Security Guide

Foreign Information Manipulation and Interference (FIMI) refers to a primarily non-illegal pattern of behavior that poses a threat or has the potential to negatively impact values, processes, and political procedures. Such activities are characterized by […]
October 20, 2023

STOPPING THE PHISHING ATTACK – SMALL AND MEDIUM SIZED BUSINESSES (SMBs) OR ORGANIZATIONS

In phishing attacks used to obtain login credentials, Malicious actors pose as trustworthy sources(e.g., colleagues, acquaintances, or organizations) to lure victims into providing their logincredentials. Malicious actors can use the compromised credentials (e.g., usernames and […]
October 8, 2023

Red Cross (ICRC) Issues Eight Rules for Hacker Groups amidst Digital Battleground

For the very first time, the International Committee of the Red Cross (ICRC) has released a set of guidelines outlining rules of engagement for civilian hackers participating in conflict scenarios. Comprising eight pivotal articles, based […]
September 24, 2023

Cyber Security Threats to 5G Infrastructure

Promoting 5G connectivity that enhances Pakistan’s national security, technological innovation, and economic opportunity collectively. The fifth-generation (5G) of wireless technology represents a complete transformation of telecommunication networks, introducing a vast array of new connections, capabilities, […]
Cyber Security Threats to 5G Infrastructure
We value your privacy
We use cookies to enhance your browsing experience, serve personalized content, and analyze our traffic. By clicking "Accept All", and by using this website you agree to our Cookies and Data Protection Policy.
Read more