• Business
  • Entertainment
  • Health
  • News
  • Sport
  • Tech
  • World
Newsy Today
news of today
Home - Network Security
Tag:

Network Security

Tech

Microsoft patches major SQL Server flaw in March update

by Chief Editor March 13, 2026
written by Chief Editor

March 2026 Patch Tuesday: A Deep Dive into Microsoft’s Latest Security Updates

Microsoft’s March 2026 Patch Tuesday addressed a substantial 77 security vulnerabilities across its product suite, with a notable focus on SQL Server. This release included fixes for two zero-day vulnerabilities that were publicly known before patches were available, though currently, there’s no evidence of widespread exploitation.

SQL Server Under Scrutiny: CVE-2026-21262

The most critical update centers around CVE-2026-21262, an elevation-of-privilege vulnerability impacting a wide range of SQL Server versions, from the latest 2025 release all the way back to SQL Server 2016 Service Pack 3. While the vulnerability has a CVSS v3 base score of 8.8 – just shy of “critical” – the potential impact is significant. An attacker with low-level privileges could potentially escalate to sysadmin-level rights over the database engine across a network.

According to Rapid7’s Lead Software Engineer, Adam Barnett, this isn’t a typical SQL Server patch. The ability to gain sysadmin access over a network is a serious concern. Despite Microsoft rating exploitation as less likely, the public disclosure of the vulnerability increases the urgency for administrators to apply the patch.

Even organizations that don’t directly expose SQL Server to the internet are at risk. Internet scanning reveals a considerable number of accessible SQL Server instances, amplifying the potential impact should reliable exploits emerge. Successful exploitation could allow attackers to access or alter data and potentially pivot to the underlying operating system using features like xp_cmdshell, which, while disabled by default, can be re-enabled by a sysadmin.

.NET Denial-of-Service Vulnerability (CVE-2026-26127)

Another key vulnerability addressed this month is CVE-2026-26127, affecting .NET applications and potentially leading to denial-of-service (DoS) conditions. Public disclosure of this vulnerability has also occurred. Exploitation could cause service crashes, creating brief windows where monitoring and security tools are offline, potentially allowing attackers to evade detection.

Repeated exploitation, even by less sophisticated attackers, could disrupt online services and lead to breaches of service-level agreements.

Authenticator App Vulnerability (CVE-2026-26123)

Microsoft also patched a vulnerability in the Microsoft Authenticator mobile app for iOS and Android (CVE-2026-26123). This flaw, related to custom URL schemes and improper authorisation, could allow a malicious app to impersonate Microsoft Authenticator and intercept authentication information, potentially leading to account compromise. While requiring user interaction – specifically, choosing a malicious app to handle the sign-in flow – Microsoft considers this an important vulnerability.

Organizations managing mobile devices should review app installation policies and default handler settings for authentication apps to restrict potentially harmful sign-in flows.

End of Life for SQL Server 2012 Parallel Data Warehouse

Beyond security patches, Microsoft announced the end of extended support for SQL Server 2012 Parallel Data Warehouse at the end of March. Customers continuing to use this platform will no longer receive security updates, leaving them vulnerable to potential exploits.

Future Trends in Vulnerability Management

These updates highlight several emerging trends in vulnerability management. The increasing speed of public disclosure before patches are available is a major concern. Attackers are actively scanning for vulnerabilities and sharing information, reducing the window of opportunity for defenders. This necessitates a shift towards proactive threat hunting and robust intrusion detection systems.

The focus on vulnerabilities in authentication mechanisms, like the Microsoft Authenticator app, underscores the growing importance of securing identity and access management (IAM) systems. Multi-factor authentication is becoming increasingly prevalent, making these applications prime targets for attackers.

The continued patching of older SQL Server versions, even those nearing end-of-life, demonstrates the long-tail challenge of maintaining security in complex environments. Organizations must prioritize patching critical vulnerabilities across all systems, regardless of age, and consider implementing compensating controls where patching is not immediately feasible.

Did you know?

Publicly disclosed vulnerabilities, even without known exploits, significantly increase the risk of attack. Attackers actively monitor vulnerability databases and security blogs for new disclosures.

FAQ

Q: What is Patch Tuesday?
A: Patch Tuesday is the unofficial name for the regular schedule when Microsoft releases security updates for its products.

Q: What is a zero-day vulnerability?
A: A zero-day vulnerability is a flaw that is unknown to the vendor and for which no patch is available, giving attackers a window of opportunity to exploit it.

Q: What is the CVSS score?
A: The Common Vulnerability Scoring System (CVSS) is an industry standard for assessing the severity of software vulnerabilities.

Q: Should I patch all vulnerabilities immediately?
A: Prioritize patching based on the severity of the vulnerability, the potential impact to your organization, and the availability of exploits.

Q: What is xp_cmdshell?
A: xp_cmdshell is a stored procedure in SQL Server that allows execution of operating system commands.

Pro Tip: Regularly scan your network for vulnerable systems and prioritize patching based on risk assessment.

Stay informed about the latest security threats and updates by subscribing to security advisories and following reputable security blogs. Proactive vulnerability management is essential for protecting your organization from cyberattacks.

March 13, 2026 0 comments
0 FacebookTwitterPinterestEmail
Tech

From Physics to Securing the Internet: The Story of FreeRADIUS Founder Alan DeKok

by Chief Editor February 17, 2026
written by Chief Editor

From Physics to Securing the Internet: The Enduring Legacy of FreeRADIUS and the Future of Network Authentication

Alan DeKok’s journey from nuclear physics to becoming a leading figure in network security is a testament to the power of adaptability and the often-unforeseen opportunities that arise from pursuing one’s curiosity. His creation, FreeRADIUS, a foundational open-source software for authenticating users, quietly underpins a significant portion of internet access worldwide – from major internet service providers to university Wi-Fi networks.

The Unseen Foundation of Internet Security

Most internet users are unaware of the complex processes happening behind the scenes to verify their identity and grant access to online resources. FreeRADIUS acts as that gatekeeper, a critical component of the Remote Authentication Dial-In User Service (RADIUS) protocol. It’s a system DeKok began developing as a side project in the late 1990s, recognizing a gap in the market for actively maintained open-source RADIUS servers.

From Strawberries to Subatomic Particles: A Unique Skillset

DeKok’s path wasn’t a direct line to technology. Growing up on a farm, he quickly realized a preference for the challenges of 8-bit computers over agricultural labor. This led him to pursue a Bachelor’s and Master’s degree in physics at Carleton University. He found physics appealing due to its blend of mathematics and practical application. His work at the Sudbury Neutrino Observatory, managing a water-purification system achieving an astonishing one atom of impurity per cubic meter, honed his problem-solving skills.

Pro Tip: DeKok emphasizes that the ability to understand the “big picture” and break down complex problems into manageable pieces – skills honed during his physics studies – are invaluable in the rapidly evolving field of network security.

The Rise of FreeRADIUS and InkBridge Networks

After stints at Gandalf and CryptoCard, DeKok founded NetworkRADIUS (now InkBridge Networks) in 2008, driven by a desire to continue developing and supporting FreeRADIUS. Today, the software is used by an estimated 100 million people daily, and InkBridge Networks employs experts across Canada, France, and the United Kingdom. DeKok estimates that at least half of the world’s internet users rely on his software for authentication.

Why RADIUS Endures: Simplicity and Implementation

Despite the emergence of alternative protocols like Diameter, RADIUS continues to thrive. While Diameter offered potential improvements, RADIUS’s simplicity and widespread existing implementation have given it a significant advantage. DeKok believes RADIUS is “never going to go away,” citing the billions of dollars of equipment currently running the protocol.

The Open-Source Advantage

DeKok attributes FreeRADIUS’s success to its open-source nature. Initially adopted as a way to enter the market with limited funding, open-sourcing allowed FreeRADIUS to compete effectively with larger companies and establish itself as an industry-leading product. This collaborative approach fosters innovation and ensures the software remains adaptable to evolving security threats.

The Future of Network Authentication: Beyond Passwords

While FreeRADIUS remains a cornerstone of network security, the landscape of authentication is rapidly changing. Several trends are poised to shape the future of how users access networks and online services:

Multi-Factor Authentication (MFA) Expansion

The increasing sophistication of cyberattacks is driving the adoption of MFA. While traditionally relying on SMS codes or authenticator apps, future MFA solutions will likely integrate biometric authentication (fingerprint, facial recognition) and passwordless technologies.

Passwordless Authentication

Passwordless authentication methods, such as WebAuthn and FIDO2, are gaining traction. These technologies leverage cryptographic keys stored on devices to verify user identity, eliminating the need for passwords altogether. This reduces the risk of phishing attacks and improves user experience.

Zero Trust Network Access (ZTNA)

ZTNA is a security model based on the principle of “never trust, always verify.” Unlike traditional VPNs, ZTNA provides granular access control based on user identity, device posture, and application context. This approach minimizes the attack surface and enhances security for remote access.

AI and Machine Learning in Authentication

Artificial intelligence (AI) and machine learning (ML) are being used to detect and prevent fraudulent authentication attempts. ML algorithms can analyze user behavior patterns to identify anomalies and flag suspicious activity, providing an additional layer of security.

Frequently Asked Questions (FAQ)

  • What is FreeRADIUS? FreeRADIUS is an open-source implementation of the RADIUS protocol, used for authenticating users and controlling network access.
  • Who uses FreeRADIUS? Major internet service providers, financial institutions, universities, and other organizations rely on FreeRADIUS for network security.
  • What is the RADIUS protocol? RADIUS is a networking protocol that provides centralized authentication, authorization, and accounting (AAA) services.
  • Is FreeRADIUS secure? FreeRADIUS is actively maintained and regularly updated to address security vulnerabilities.

Alan DeKok’s story highlights the importance of adaptability, continuous learning, and the often-serendipitous nature of career paths. As network security continues to evolve, the principles he embodies – a focus on foundational knowledge, a willingness to embrace new technologies, and a commitment to open collaboration – will remain essential for securing the internet for years to come.

Explore more articles on network security and open-source technologies.

February 17, 2026 0 comments
0 FacebookTwitterPinterestEmail
Tech

Washington pushes back against EU’s bid for tech autonomy – POLITICO

by Chief Editor February 14, 2026
written by Chief Editor

The Shifting Sands of Tech Sovereignty: Europe and the US Navigate a New Digital Landscape

The relationship between the United States and Europe is undergoing a subtle but significant shift, particularly concerning technology. While a transatlantic alliance remains, growing concerns about reliance on both US and Chinese tech are fueling a push for “tech sovereignty” in Europe. This isn’t simply about protectionism; it’s a strategic move to secure critical infrastructure and data in key sectors like AI, quantum technologies, and semiconductors.

The US Position: A Clear Distinction

A key argument emerging from the US, as articulated by a Trump advisor, is a clear distinction between American and Chinese technology. The claim centers on data privacy: personal data is not systematically transferred to the state in the US, unlike concerns surrounding Chinese laws that compel firms to share data for surveillance purposes. This perspective frames the debate not as a rejection of foreign tech, but as a preference for systems aligned with democratic values.

However, this argument isn’t universally accepted. Europe’s pursuit of tech sovereignty suggests a broader unease with dependence on any single foreign power, even a traditional ally. The recent POLITICO Poll reveals a declining perception of the US as a reliable ally across several European nations, including Germany and Canada, further complicating the dynamic.

Europe’s Drive for Independence

The European Commission is actively preparing a “tech sovereignty” package, aiming to bolster homegrown technology and reduce reliance on external suppliers. A cybersecurity proposal, currently under consideration, could empower Europe to identify and mitigate risks associated with foreign tech providers – including those from the US. The focus is on ensuring capacity and independence in critical sectors.

This move isn’t new, but it’s gaining momentum. German Chancellor Friedrich Merz recently voiced concerns about the erosion of US leadership on the international stage, signaling a growing willingness to chart a more independent course.

The Implications of a Fracturing Tech Landscape

The potential consequences of this shift are far-reaching. A fragmented tech landscape could lead to:

  • Increased Costs: Developing and maintaining independent tech stacks requires significant investment.
  • Slower Innovation: Reduced collaboration could hinder the pace of technological advancement.
  • Geopolitical Tensions: Competition for technological dominance could exacerbate existing geopolitical rivalries.
  • New Standards: Diverging standards could create interoperability challenges.

The debate highlights a fundamental question: can a truly “open” and interconnected digital world coexist with national security concerns and the desire for strategic autonomy?

Pro Tip:

For businesses operating in both the US and Europe, understanding these evolving dynamics is crucial. Diversifying supply chains and prioritizing data privacy will be key to navigating this new landscape.

FAQ: Tech Sovereignty and the US-Europe Relationship

What is “tech sovereignty”? It refers to a nation’s ability to control its own digital infrastructure and data, reducing reliance on foreign technology and ensuring strategic independence.

Is Europe completely rejecting US tech? Not necessarily. The focus is on reducing dependence and mitigating potential security risks, rather than a complete ban.

What are the key sectors driving this push for independence? AI, quantum technologies, and semiconductors are considered particularly critical.

How does this affect businesses? Businesses may necessitate to adapt to new regulations, diversify their supply chains, and prioritize data privacy.

Did you know? The concept of tech sovereignty is not limited to Europe. Countries around the world are increasingly focused on securing their digital infrastructure.

Want to learn more about the evolving geopolitical landscape of technology? Explore our articles on cybersecurity threats and international data privacy regulations.

Share your thoughts on the future of tech sovereignty in the comments below!

February 14, 2026 0 comments
0 FacebookTwitterPinterestEmail
Business

Orange Business and Cisco Launch PQC-Secured Network Services

by Chief Editor February 10, 2026
written by Chief Editor

The Quantum Security Race: Orange Business and Cisco Lead the Charge

The threat of quantum computing cracking today’s encryption isn’t a distant future concern – it’s driving immediate action. Orange Business and Cisco are at the forefront, launching post-quantum cryptography (PQC)-secured network services designed to protect sensitive data from future attacks. This collaboration marks a significant step towards a quantum-safe world, particularly for enterprises and public sector organizations.

Why Now? The “Harvest Now, Decrypt Later” Threat

Quantum computers, once fully realized, will possess the power to break many of the cryptographic algorithms that currently secure internet traffic. This creates a dangerous scenario known as “harvest now, decrypt later,” where malicious actors intercept and store encrypted data today, with the intention of decrypting it once quantum computers become powerful enough. Protecting data requires proactive measures, not reactive ones.

Orange Business: Pioneering PQC in Europe

Orange Business is the first European service provider to offer globally available PQC-secured network services. These services are built on Cisco’s 8000 Series Secure Routers and are available immediately. Managed Cisco SD-WAN services with post-quantum protection are slated for commercial availability in the third quarter of 2026. This phased approach allows organizations to adopt PQC gradually, minimizing disruption.

SD-WAN: The Ideal Platform for Quantum-Safe Networking

Integrating PQC into Software-Defined Wide Area Networks (SD-WAN) offers a powerful and flexible solution. PQC within SD-WAN infrastructure secures not just individual connections, but the entire network, including control and data planes. This provides a centrally managed, quantum-resilient WAN that can adapt as security standards evolve. It’s a future-proof approach to network security.

The Orange Quantum Defender Portfolio

This collaboration with Cisco expands the Orange Quantum Defender range of solutions. Orange is prioritizing embedding post-quantum security into network security now, rather than treating it as a future upgrade. This proactive stance reflects a commitment to long-term data protection.

Crypto-Agility: A Key Component of Quantum Resilience

A core principle of Orange’s quantum-safe networking strategy is crypto-agility. This means designing networks to quickly adapt to new cryptographic algorithms and protocols. This flexibility is crucial for maintaining confidentiality over long data lifecycles and responding to evolving quantum threats.

Beyond the Headlines: What This Means for Businesses

The launch of these PQC-secured services signals a shift in the cybersecurity landscape. Organizations can no longer afford to ignore the quantum threat. Implementing PQC now is an investment in long-term data security and business continuity.

Real-World Applications

Consider a financial institution handling sensitive customer data. Protecting this data from future decryption is paramount. PQC-secured WAN services can safeguard transactions, account information, and other critical data as it travels between branches, data centers, and cloud platforms. Similarly, government agencies dealing with classified information can benefit from this enhanced security.

Looking Ahead: The Future of Quantum-Safe Networking

The collaboration between Orange Business and Cisco is a significant milestone, but it’s just the beginning. Expect to notice further advancements in PQC algorithms, increased adoption of quantum key distribution (QKD) alongside PQC, and the development of more sophisticated quantum-safe networking solutions.

FAQ: Post-Quantum Cryptography Explained

  • What is post-quantum cryptography? PQC refers to cryptographic algorithms that are believed to be resistant to attacks from both classical and quantum computers.
  • Why is PQC important now? Even though powerful quantum computers don’t exist yet, the threat is real. Data intercepted today could be decrypted in the future.
  • What is the role of SD-WAN in quantum-safe networking? SD-WAN provides a flexible and centrally managed platform for deploying and managing PQC.
  • Is PQC difficult to implement? Integrating PQC into SD-WAN infrastructure simplifies implementation, particularly as a managed service.

Pro Tip: Begin assessing your organization’s data security posture and identifying critical data assets that require protection against quantum threats. Consult with cybersecurity experts to develop a tailored PQC implementation plan.

Did you know? The National Institute of Standards and Technology (NIST) is actively working to standardize PQC algorithms, providing a framework for secure implementation.

Want to learn more about securing your network for the quantum era? Share your thoughts and questions in the comments below!

February 10, 2026 0 comments
0 FacebookTwitterPinterestEmail
Tech

Shadow AI assistant Clawdbot raises workplace risks

by Chief Editor January 29, 2026
written by Chief Editor

The Rise of ‘Shadow AI’: How Unsanctioned Tools Like Clawdbot Are Reshaping Corporate Security

A recent report from Token Security Labs has revealed a startling trend: employees are increasingly adopting personal AI assistants – often without IT’s knowledge. Their analysis found Clawdbot (also known as Moltbot) is currently active within 22% of their customer organizations. This isn’t an isolated incident; it’s a symptom of a larger shift towards “shadow AI,” where powerful AI tools operate outside traditional security perimeters.

What is ‘Shadow AI’ and Why is it a Problem?

Shadow AI refers to the use of AI applications and services within an organization that haven’t been vetted or approved by the IT or security teams. Clawdbot, a locally-run AI assistant connecting to popular messaging apps like Slack, WhatsApp, and Microsoft Teams, exemplifies this. While offering convenience – calendar management, email responses, file access – it introduces significant risks. The core issue? Broad access to sensitive data coupled with lax security practices.

Consider this scenario: an employee uses Clawdbot on their personal laptop, connecting it to corporate Slack. Suddenly, confidential internal discussions, files, and even credentials are potentially accessible outside the company’s secure network. This bypasses crucial data loss prevention (DLP) controls and audit trails, making it difficult to detect and respond to breaches.

Did you know? A 2023 Gartner report estimated that 30% of organizations will experience “shadow IT” related security incidents by 2024, and AI tools are rapidly becoming a major component of this risk.

The Security Risks: Plaintext Credentials and Exposed APIs

Token Security’s investigation uncovered alarming security vulnerabilities. Clawdbot stores credentials in plaintext, meaning anyone with access to the user’s device can easily view them. Furthermore, researchers like Jamieson O’Reilly have discovered hundreds of publicly accessible Clawdbot instances with open admin dashboards, exposing API keys, OAuth tokens, and conversation histories. In some cases, remote code execution was even possible.

The lack of default sandboxing – explicitly acknowledged in Clawdbot’s documentation – further exacerbates the problem. This means the AI assistant operates with significant system access, increasing the potential damage from a successful attack. Prompt injection, where malicious instructions are embedded within seemingly harmless inputs, also poses a threat when the tool processes emails, documents, and web pages.

Beyond Clawdbot: The Expanding Landscape of Personal AI

Clawdbot is just the tip of the iceberg. The proliferation of open-source Large Language Models (LLMs) and user-friendly interfaces is making it easier than ever for employees to deploy personal AI assistants. Tools like LM Studio and Ollama allow users to run powerful models locally, further blurring the lines between personal and corporate data.

This trend is fueled by a genuine desire for increased productivity. Employees are seeking ways to automate tasks, streamline workflows, and gain a competitive edge. However, without proper guidance and security measures, these efforts can inadvertently create significant vulnerabilities.

What Can Organizations Do? A Proactive Approach

Addressing the challenge of shadow AI requires a multi-faceted approach:

  • Discovery and Visibility: Monitor network traffic for patterns associated with AI assistant activity. Scan endpoints for the presence of directories like “.clawdbot”.
  • Permission and Access Control: Regularly review OAuth grants and API tokens connected to critical systems. Revoke unauthorized integrations.
  • Clear Policies: Establish clear policies regarding the use of personal AI agents, outlining acceptable use cases and security requirements.
  • Approved Alternatives: Provide employees with secure, enterprise-grade AI tools that offer the functionality they need while maintaining IT oversight.

Pro Tip: Implement a robust security awareness training program to educate employees about the risks associated with shadow AI and the importance of following security protocols.

The Future of AI Security: Zero Trust and Continuous Monitoring

Looking ahead, the rise of shadow AI will likely accelerate the adoption of zero-trust security models. This approach assumes that no user or device is inherently trustworthy and requires continuous verification before granting access to resources.

Continuous monitoring and threat detection will also become increasingly critical. Organizations will need to leverage AI-powered security tools to identify and respond to anomalous activity associated with shadow AI applications. The focus will shift from simply blocking these tools to understanding how they are being used and mitigating the associated risks.

Furthermore, expect to see increased collaboration between security vendors and AI developers to build more secure and responsible AI solutions. This includes incorporating privacy-preserving techniques, robust access controls, and comprehensive audit logging.

FAQ: Shadow AI and Your Organization

  • What is the biggest risk of shadow AI? The biggest risk is the potential for data breaches and unauthorized access to sensitive information due to lack of security controls and visibility.
  • How can I detect shadow AI in my organization? Monitor network traffic, scan endpoints, and review OAuth grants and API tokens.
  • Should I completely ban the use of personal AI assistants? A complete ban may not be practical or effective. Instead, focus on providing secure alternatives and establishing clear policies.
  • What is OAuth? OAuth (Open Authorization) is a standard protocol that allows users to grant third-party applications access to their data without sharing their passwords.

The emergence of shadow AI is a wake-up call for organizations. Ignoring this trend is not an option. By proactively addressing the risks and embracing a security-first approach, businesses can harness the power of AI while protecting their valuable assets.

Want to learn more about securing your organization against emerging AI threats? Explore our comprehensive security solutions or subscribe to our newsletter for the latest insights.

January 29, 2026 0 comments
0 FacebookTwitterPinterestEmail
Tech

Cisco Fixes Actively Exploited Zero-Day CVE-2026-20045 in Unified CM and Webex

by Chief Editor January 22, 2026
written by Chief Editor

Cisco Zero-Days: A Harbinger of Increased Attacks on Collaboration Tools?

The recent disclosure of CVE-2026-20045, a critical zero-day vulnerability impacting Cisco’s Unified Communications and Webex Calling platforms, isn’t an isolated incident. It’s a stark reminder of a growing trend: collaboration tools are rapidly becoming prime targets for malicious actors. This vulnerability, already exploited in the wild, allows unauthenticated remote code execution – a worst-case scenario for any organization. The speed with which the U.S. Cybersecurity and Infrastructure Security Agency (CISA) added this to its Known Exploited Vulnerabilities (KEV) catalog, mandating fixes for federal agencies, underscores the severity of the threat.

The Expanding Attack Surface of Unified Communications

For years, network infrastructure devices like routers and firewalls received the bulk of security attention. However, the shift towards hybrid and remote work has dramatically expanded the attack surface. Unified Communications (UC) systems – encompassing voice, video conferencing, messaging, and collaboration platforms – are now critical to business operations, and therefore, incredibly attractive to attackers. These systems often handle sensitive data and provide access points to internal networks.

The complexity of modern UC deployments also contributes to the risk. Integrating various applications and services creates multiple potential entry points for attackers. A 2024 report by Verizon’s DBIR showed a 60% increase in breaches involving collaboration tools compared to the previous year, highlighting this escalating threat.

Zero-Day Exploitation: A Rising Tide

The fact that CVE-2026-20045 was actively exploited as a zero-day – meaning before a patch was available – is particularly concerning. Zero-day exploits are notoriously difficult to defend against, as organizations have no prior warning. The increasing sophistication of threat actors, coupled with the growing market for zero-day vulnerabilities, suggests this trend will continue. We’ve already seen this play out with the recent critical vulnerability in Cisco Secure Email Gateway (CVE-2025-20393), demonstrating a pattern of targeting Cisco products.

Pro Tip: Implement a robust vulnerability management program that includes continuous monitoring for new threats and rapid patching capabilities. Prioritize vulnerabilities based on their severity and potential impact.

Beyond Cisco: A Broader Industry Challenge

While Cisco is currently in the spotlight, the vulnerability isn’t unique to their products. Similar vulnerabilities have been discovered in other leading UC platforms, including Microsoft Teams, Zoom, and Slack. This suggests a systemic issue within the industry – a need for more secure-by-design development practices and rigorous security testing.

The rise of supply chain attacks further complicates the situation. UC platforms often rely on third-party components and integrations, which can introduce vulnerabilities. Organizations need to carefully assess the security posture of their vendors and ensure they have adequate security controls in place.

The Role of AI in Both Attack and Defense

Artificial intelligence (AI) is playing an increasingly significant role in cybersecurity, both for attackers and defenders. Attackers are using AI to automate vulnerability discovery, craft more sophisticated phishing attacks, and evade detection. Conversely, AI-powered security tools can help organizations detect and respond to threats more quickly and effectively.

Did you know? AI-powered threat intelligence platforms can analyze vast amounts of data to identify emerging threats and predict future attacks.

Future Trends: What to Expect

Several key trends are likely to shape the future of UC security:

  • Increased Focus on Zero Trust: Adopting a Zero Trust architecture, which assumes no user or device is trusted by default, will be crucial for securing UC environments.
  • Enhanced Endpoint Security: Protecting endpoints – laptops, smartphones, and other devices used to access UC platforms – will become even more important.
  • AI-Driven Security Automation: Organizations will increasingly rely on AI-powered tools to automate security tasks, such as threat detection, incident response, and vulnerability management.
  • Secure SD-WAN Integration: As more organizations adopt Secure SD-WAN, integrating UC security with SD-WAN infrastructure will be essential.
  • Greater Regulatory Scrutiny: Governments are likely to increase regulatory scrutiny of UC security, particularly in industries that handle sensitive data.

FAQ

Q: What is a zero-day vulnerability?
A: A zero-day vulnerability is a software flaw that is unknown to the vendor and for which no patch is available. This makes it particularly dangerous, as attackers can exploit it before defenses can be put in place.

Q: What is CISA’s KEV catalog?
A: The KEV catalog lists vulnerabilities that have been actively exploited in the wild. Federal agencies are required to patch these vulnerabilities within a specified timeframe.

Q: How can I protect my organization from UC vulnerabilities?
A: Implement a robust vulnerability management program, adopt a Zero Trust architecture, enhance endpoint security, and stay informed about the latest threats.

Q: What is the CVSS score?
A: The Common Vulnerability Scoring System (CVSS) is an open framework for communicating the characteristics and severity of software vulnerabilities. A higher score indicates a more critical vulnerability.

To stay ahead of evolving threats, regularly review your security posture, prioritize patching, and invest in advanced security solutions. Explore our other articles on cybersecurity best practices and threat intelligence to learn more about protecting your organization.

January 22, 2026 0 comments
0 FacebookTwitterPinterestEmail
Tech

OpenAI Launches ChatGPT Health with Isolated, Encrypted Health Data Controls

by Chief Editor January 8, 2026
written by Chief Editor

The Rise of AI Health Companions: Beyond ChatGPT Health

OpenAI’s launch of ChatGPT Health marks a pivotal moment, but it’s just the beginning. The integration of artificial intelligence into personal healthcare is rapidly accelerating, driven by user demand for accessible information and proactive health management. This isn’t simply about chatbots answering medical questions; it’s about creating personalized, preventative health ecosystems.

The Data-Driven Future of Personalized Health

ChatGPT Health’s ability to connect with apps like Apple Health, MyFitnessPal, and Peloton is a key indicator of where things are headed. The real power lies in the aggregation and analysis of this data. Imagine an AI not just telling you to exercise more, but suggesting a specific Peloton class based on your recent sleep data from Apple Health, your dietary intake from MyFitnessPal, and even factoring in local air quality to optimize your outdoor workout. This level of granular personalization was science fiction just a few years ago.

According to a recent report by Grand View Research, the global AI in healthcare market is projected to reach $187.95 billion by 2030, growing at a CAGR of 38.4% from 2023. This explosive growth is fueled by increasing volumes of health data, advancements in machine learning, and a growing need to address healthcare costs and accessibility.

Addressing the Risks: Privacy, Accuracy, and the Human Touch

The recent scrutiny surrounding AI-generated health information – highlighted by The Guardian’s investigation into Google AI Overviews and tragic cases of individuals receiving harmful advice from chatbots – underscores the critical need for robust safeguards. OpenAI’s emphasis on data isolation, encryption, and non-use of health data for model training are crucial steps. However, these measures must be continuously refined.

The lawsuits facing OpenAI and Character.AI serve as stark reminders that AI is not a substitute for human medical professionals. AI should augment, not replace, the doctor-patient relationship. The HealthBench benchmark, developed by OpenAI, is a positive step towards evaluating AI’s clinical accuracy, but independent validation and ongoing monitoring are essential.

Did you know? A study published in the Journal of the American Medical Informatics Association found that AI-powered diagnostic tools can achieve accuracy rates comparable to human doctors in certain specialties, but often struggle with rare or complex cases.

Beyond Chatbots: Emerging Trends in AI Healthcare

The future of AI in healthcare extends far beyond conversational interfaces. Here are some key trends to watch:

  • AI-Powered Diagnostics: AI algorithms are being used to analyze medical images (X-rays, MRIs, CT scans) with increasing accuracy, aiding in early detection of diseases like cancer and Alzheimer’s.
  • Drug Discovery and Development: AI is accelerating the drug discovery process by identifying potential drug candidates, predicting their efficacy, and optimizing clinical trial design.
  • Remote Patient Monitoring: Wearable sensors and AI-powered platforms are enabling continuous monitoring of patients’ vital signs and health data, allowing for proactive intervention and personalized care.
  • Mental Health Support: AI chatbots and virtual therapists are providing accessible and affordable mental health support, particularly for individuals in underserved communities.
  • Predictive Analytics for Public Health: AI is being used to predict disease outbreaks, identify at-risk populations, and optimize resource allocation for public health initiatives.

The Role of Regulation and Ethical Considerations

As AI becomes more deeply integrated into healthcare, robust regulatory frameworks are needed to ensure patient safety, data privacy, and algorithmic fairness. The FDA is actively developing guidelines for the approval of AI-powered medical devices, but a comprehensive and adaptable regulatory approach is crucial.

Ethical considerations, such as bias in algorithms and the potential for job displacement, must also be addressed proactively. Transparency, accountability, and human oversight are essential to building trust in AI-powered healthcare solutions.

Pro Tip: When using AI health tools, always verify information with a qualified healthcare professional. AI should be seen as a supplement to, not a replacement for, traditional medical care.

The Expanding Ecosystem: Competition and Collaboration

OpenAI isn’t alone in this space. Google, Microsoft, and numerous startups are investing heavily in AI healthcare solutions. We’re likely to see increased competition, leading to innovation and lower costs. However, collaboration between AI developers, healthcare providers, and regulatory agencies will be essential to realizing the full potential of this technology.

The integration of AI into electronic health records (EHRs) is also a key area of development. AI can help streamline clinical workflows, reduce administrative burdens, and improve the accuracy of medical documentation.

Frequently Asked Questions (FAQ)

  • Is AI healthcare safe? AI healthcare tools are generally safe when used responsibly and with appropriate safeguards. However, it’s crucial to verify information with a healthcare professional and be aware of potential risks.
  • Will AI replace doctors? No, AI is not expected to replace doctors. It will augment their capabilities, allowing them to focus on more complex cases and provide more personalized care.
  • How is my health data protected? Reputable AI healthcare providers employ robust security measures, such as encryption and data isolation, to protect patient data.
  • What are the limitations of AI in healthcare? AI can struggle with rare or complex cases, and it may be susceptible to bias in algorithms. Human oversight is essential.

The future of healthcare is undeniably intertwined with artificial intelligence. By embracing innovation while prioritizing safety, ethics, and the human touch, we can unlock the transformative potential of AI to improve health outcomes for all.

Want to learn more? Explore our other articles on digital health and artificial intelligence. Subscribe to our newsletter for the latest updates and insights.

January 8, 2026 0 comments
0 FacebookTwitterPinterestEmail
Tech

New MongoDB Flaw Lets Unauthenticated Attackers Read Uninitialized Memory

by Chief Editor December 27, 2025
written by Chief Editor

MongoDB Vulnerability: A Harbinger of Future Database Security Challenges

A recently disclosed high-severity flaw in MongoDB (CVE-2025-14847) – allowing unauthenticated read access to heap memory – isn’t just a patch-and-move-on situation. It’s a stark reminder of the evolving threat landscape facing database security, and a glimpse into challenges we’ll see amplified in the coming years. This vulnerability, stemming from improper handling of length parameters in Zlib compression, highlights a growing trend: attacks exploiting low-level protocol weaknesses.

The Rise of Protocol-Level Attacks

For years, database security focused heavily on authentication, authorization, and encryption. While these remain crucial, attackers are increasingly targeting the underlying protocols that databases use to communicate. The MongoDB flaw is a prime example. It doesn’t require bypassing login credentials; it exploits a weakness in how data is compressed and transmitted.

We’ve seen similar trends in other areas. The Log4Shell vulnerability (CVE-2021-44228) demonstrated the devastating impact of flaws in widely used logging libraries. These aren’t application-level bugs; they’re fundamental weaknesses in the infrastructure that supports applications. Expect more of this. As software supply chains become more complex, the attack surface expands, and these lower-level vulnerabilities become increasingly attractive targets.

Pro Tip: Regularly audit your database configurations, paying close attention to compression settings and protocol versions. Disabling unnecessary features, like Zlib compression as a temporary mitigation, can significantly reduce your risk.

The Expanding Attack Surface: Cloud and Distributed Databases

The shift to cloud-native and distributed database architectures introduces new layers of complexity – and new potential vulnerabilities. Databases are no longer monolithic entities residing within a secure perimeter. They’re often fragmented across multiple cloud providers, utilizing microservices, and exposed through APIs.

This distributed nature makes it harder to maintain consistent security policies and monitor for malicious activity. A vulnerability in one component can potentially compromise the entire system. Consider the increasing adoption of multi-model databases – databases that support multiple data models (document, graph, key-value) within a single system. Each model introduces its own unique security considerations.

According to Gartner, by 2026, 70% of new database deployments will be cloud-native. This trend necessitates a shift towards cloud-native security tools and practices, including robust identity and access management (IAM), data loss prevention (DLP), and continuous monitoring.

AI-Powered Attacks and Database Security

Artificial intelligence (AI) is a double-edged sword. While AI can enhance database security through threat detection and automated vulnerability management, it can also be used by attackers to automate and scale their attacks.

AI-powered fuzzing, for example, can rapidly identify vulnerabilities in database protocols and APIs. AI can also be used to craft sophisticated SQL injection attacks that bypass traditional security measures. Furthermore, AI can analyze database traffic patterns to identify sensitive data and potential targets.

A recent report by IBM Security highlights the growing use of AI by cybercriminals, with a significant increase in AI-powered phishing attacks and malware campaigns. Database security teams need to proactively adopt AI-driven security solutions to stay ahead of these evolving threats.

The Importance of Zero Trust Database Security

The traditional “trust but verify” security model is no longer sufficient. The principle of Zero Trust – never trust, always verify – is becoming increasingly essential for database security. This means implementing strict access controls, continuously monitoring user activity, and verifying the integrity of data at every stage of the lifecycle.

Zero Trust database security involves several key components:

  • Microsegmentation: Isolating database workloads to limit the blast radius of a potential breach.
  • Multi-Factor Authentication (MFA): Requiring multiple forms of authentication to access sensitive data.
  • Data Encryption: Protecting data both in transit and at rest.
  • Continuous Monitoring and Auditing: Tracking user activity and identifying suspicious behavior.

Mitigation and Future-Proofing

For the current MongoDB vulnerability, upgrading to a patched version (8.2.3, 8.0.17, 7.0.28, 6.0.27, 5.0.32, or 4.4.30) is the most effective solution. As a temporary workaround, disabling Zlib compression is recommended. However, this can impact performance.

Looking ahead, organizations should prioritize:

  • Regular Vulnerability Scanning: Proactively identifying and addressing security flaws.
  • Security Awareness Training: Educating employees about the latest threats and best practices.
  • Incident Response Planning: Developing a plan to effectively respond to and recover from security incidents.
  • Database Activity Monitoring (DAM): Real-time monitoring of database traffic to detect and prevent malicious activity.

FAQ

Q: What is CVE-2025-14847?
A: It’s a high-severity vulnerability in MongoDB that allows unauthenticated users to read uninitialized heap memory.

Q: How can I protect my MongoDB database?
A: Upgrade to a patched version or disable Zlib compression.

Q: What is Zero Trust security?
A: A security model based on the principle of “never trust, always verify.”

Q: Will AI make database security harder?
A: Yes, AI can be used by attackers to automate and scale their attacks, but it can also be used to enhance security.

Stay informed about the latest database security threats and best practices. Explore our other articles and subscribe to our newsletter for regular updates.

December 27, 2025 0 comments
0 FacebookTwitterPinterestEmail
Tech

Fake WhatsApp API Package on npm Steals Messages, Contacts, and Login Tokens

by Chief Editor December 22, 2025
written by Chief Editor

December 22, 2025Ravie LakshmananMalware / Open Source / Supply Chain Security

The Rising Tide of Malicious Packages: A Looming Threat to Software Supply Chains

The recent discovery of “lotusbail,” a malicious npm package masquerading as a WhatsApp API, and a wave of compromised NuGet packages targeting the cryptocurrency ecosystem, aren’t isolated incidents. They represent a dangerous escalation in supply chain attacks – a trend poised to become even more prevalent and sophisticated in the coming years. These attacks exploit the trust developers place in open-source repositories, turning essential tools into conduits for malware.

Understanding the Attack Vectors: Beyond Simple Code Injection

Historically, supply chain attacks focused on directly compromising widely used software components. Today, attackers are becoming more subtle. “lotusbail,” with its 56,000+ downloads, didn’t simply inject malicious code; it offered a functional API, luring developers into unwittingly granting it access to sensitive data like WhatsApp credentials, message history, and even enabling persistent account hijacking. This is a key shift. Attackers are now prioritizing deception alongside technical exploitation.

The NuGet package attacks further illustrate this trend. By targeting the crypto space, attackers aimed for high-value targets – developers building applications that handle financial transactions. The packages employed tactics like inflated download counts and rapid version releases to appear legitimate, exploiting the inherent trust in active maintenance. The focus on stealing Google Ads OAuth information in one package demonstrates a broadening scope beyond direct financial gain, targeting advertising infrastructure.

Did you know? Supply chain attacks are estimated to have increased by 650% between 2021 and 2023, according to a report by Check Point Research.

The Future of Supply Chain Attacks: AI, Automation, and Polymorphism

Several factors suggest these attacks will become more frequent and harder to detect. The increasing adoption of AI and machine learning by attackers will play a significant role. AI can be used to:

  • Generate more convincing malicious code: AI can write code that closely mimics legitimate libraries, making it harder for static analysis tools to identify threats.
  • Automate vulnerability discovery: AI can scan open-source repositories for vulnerabilities faster and more efficiently than human researchers.
  • Create polymorphic malware: AI can generate variations of malware that evade signature-based detection systems.

Automation will also be crucial. Attackers will likely automate the process of creating and publishing malicious packages, allowing them to target a wider range of ecosystems and quickly adapt to security measures. We’ll see more sophisticated techniques to manipulate package metadata and reputation scores.

The Rise of the “Living Off the Land” (LotL) Approach

The “lotusbail” case exemplifies a growing trend: attackers leveraging existing tools and APIs to achieve their objectives. This “Living Off the Land” (LotL) approach makes detection more difficult because malicious activity blends in with legitimate system processes. Instead of introducing entirely new malware, attackers are hijacking existing functionality. Expect to see more attacks that exploit legitimate APIs and services in unexpected ways.

The Impact on Emerging Technologies: IoT and Edge Computing

The vulnerability of software supply chains extends beyond traditional software development. The proliferation of IoT devices and edge computing environments creates new attack surfaces. These devices often rely on pre-built software components and have limited security capabilities, making them prime targets for supply chain attacks. Compromised firmware updates, for example, could allow attackers to gain control of entire networks of IoT devices.

Proactive Defense Strategies: Shifting Left and Embracing Zero Trust

Combating these threats requires a fundamental shift in security thinking. Organizations need to move beyond reactive security measures and embrace proactive strategies, including:

  • Software Bill of Materials (SBOM): Creating a detailed inventory of all software components used in an application.
  • Supply Chain Security Scanning: Using tools to automatically scan open-source dependencies for known vulnerabilities and malicious code. Snyk and Sonatype are examples of companies offering these services.
  • Zero Trust Architecture: Implementing a security model that assumes no user or device is trusted by default.
  • Enhanced Code Review: Investing in thorough code review processes to identify potential vulnerabilities and malicious code.
  • Dependency Pinning: Specifying exact versions of dependencies to prevent unexpected updates that could introduce vulnerabilities.

Pro Tip: Regularly audit your development environment and dependencies. Don’t rely solely on reputation scores – verify the integrity of the code yourself.

The Role of Open-Source Communities and Collaboration

Addressing the supply chain security challenge requires collaboration between developers, security researchers, and open-source communities. Sharing threat intelligence, developing secure coding practices, and fostering a culture of security awareness are essential. Initiatives like the Open Source Security Foundation (OpenSSF) are playing a crucial role in promoting these efforts.

FAQ: Supply Chain Security

  • What is a software supply chain attack? A software supply chain attack targets the components and processes used to develop and distribute software, aiming to inject malicious code or compromise legitimate systems.
  • Why are supply chain attacks increasing? Attackers are finding it easier to compromise widely used software components than to directly attack individual targets.
  • How can developers protect themselves? Use SBOMs, scan dependencies for vulnerabilities, implement zero trust principles, and practice secure coding.
  • What is an SBOM? A Software Bill of Materials is a nested inventory of a software application’s components, used to identify and manage security risks.

The threat landscape is evolving rapidly. Staying ahead requires a proactive, multi-layered approach to security, a commitment to collaboration, and a recognition that the software supply chain is a critical vulnerability that demands constant vigilance.

Want to learn more? Explore our other articles on open-source security and threat intelligence. Subscribe to our newsletter for the latest updates on cybersecurity threats and best practices.

December 22, 2025 0 comments
0 FacebookTwitterPinterestEmail
Tech

Russia-Linked Hackers Use Microsoft 365 Device Code Phishing for Account Takeovers

by Chief Editor December 20, 2025
written by Chief Editor

The Rise of Device Code Phishing: A Glimpse into the Future of Account Takeovers

A concerning trend is rapidly gaining traction in the cybersecurity landscape: device code phishing. Recent reports, including analysis by Proofpoint of the UNK_AcademicFlare campaign attributed to a Russia-aligned group, highlight a sophisticated technique for stealing Microsoft 365 credentials. This isn’t a fleeting threat; it’s a harbinger of how attackers will increasingly leverage legitimate system features against us. The core issue? Attackers are exploiting the convenience of device code authentication to bypass traditional security measures.

How Device Code Phishing Works – And Why It’s So Effective

Traditional phishing relies on tricking users into directly entering usernames and passwords on fake login pages. Device code phishing is more subtle. It directs victims to a legitimate Microsoft login page after they’ve already initiated a seemingly harmless action – like reviewing a document link. The attacker intercepts the generated access token, effectively gaining control of the account. This method is particularly dangerous because it leverages Microsoft’s own security protocols, making it harder for users and security systems to detect.

The availability of readily accessible tools like Graphish and SquarePhish is dramatically lowering the barrier to entry for these attacks. These tools don’t require advanced technical skills, meaning even less sophisticated threat actors can launch highly effective campaigns. According to a recent Verizon Data Breach Investigations Report (DBIR), phishing remains the primary vector for data breaches, accounting for over 74% of breaches in 2024. The evolution to device code phishing represents a significant escalation in sophistication within this already dominant attack vector.

The Geopolitical Landscape: Russia-Aligned Actors and Beyond

The UNK_AcademicFlare campaign is just one example. Attribution consistently points to Russia-aligned groups like Storm-2372, APT29, and others actively employing this technique. Their targets are strategically chosen: government organizations, think tanks, educational institutions, and critical infrastructure. This suggests a clear intent to gather intelligence, disrupt operations, or potentially conduct espionage. However, it’s crucial to understand that this technique isn’t exclusive to state-sponsored actors. The ease of use and effectiveness mean it will likely be adopted by a wider range of cybercriminals.

Did you know? The initial documentation of device code phishing by Microsoft and Volexity in February 2025 served as a blueprint for subsequent attacks, demonstrating how quickly threat actors adapt and refine their tactics.

Future Trends: What to Expect in the Coming Years

Several trends suggest device code phishing will become even more prevalent and sophisticated:

  • Increased Automation: Attackers will likely automate the entire process, from initial phishing email to token interception, reducing the need for manual intervention.
  • Multi-Cloud Targeting: While currently focused on Microsoft 365, attackers will adapt this technique to target other cloud platforms like Google Workspace and Amazon AWS.
  • AI-Powered Phishing: Artificial intelligence will be used to create more convincing and personalized phishing emails, increasing the likelihood of success. Expect more sophisticated natural language processing to bypass spam filters and more realistic fake landing pages.
  • Bypassing Multi-Factor Authentication (MFA): Device code phishing effectively circumvents traditional MFA methods, making it a particularly dangerous threat for organizations relying solely on MFA for security.
  • Supply Chain Attacks: Attackers may target software vendors or service providers to distribute phishing links to a wider audience, amplifying the impact of their campaigns.

Proactive Defense: Mitigating the Risk

Organizations need to move beyond reactive security measures and adopt a proactive approach to defend against device code phishing. Here are some key steps:

  • Conditional Access Policies: Implement Conditional Access policies in Microsoft 365 to block device code authentication flows for all users, or restrict it to approved users, operating systems, and IP ranges.
  • Enhanced Monitoring: Monitor for unusual login activity, such as logins from unexpected locations or devices.
  • User Awareness Training: Educate employees about the dangers of device code phishing and how to identify suspicious emails and links. Simulated phishing exercises can help reinforce this training.
  • Zero Trust Architecture: Adopt a Zero Trust security model, which assumes that no user or device is trusted by default.
  • Endpoint Detection and Response (EDR): Deploy EDR solutions to detect and respond to malicious activity on endpoints.

Pro Tip: Regularly review and update your security policies to ensure they are aligned with the latest threat landscape. Don’t rely on a “set it and forget it” approach.

FAQ: Device Code Phishing – Your Questions Answered

  • What is device code phishing? It’s a phishing technique that exploits Microsoft’s device code authentication process to steal credentials.
  • Is MFA enough to protect against this? No, device code phishing bypasses traditional MFA methods.
  • Who is behind these attacks? Primarily Russia-aligned threat actors, but the technique is becoming more widespread.
  • How can I protect my organization? Implement Conditional Access policies, enhance monitoring, and provide user awareness training.
  • What tools are attackers using? Tools like Graphish and SquarePhish are lowering the barrier to entry for these attacks.

Further reading on Microsoft’s security guidance can be found here. For more information on threat intelligence, explore resources from Proofpoint and Volexity.

The evolution of phishing tactics demands constant vigilance and adaptation. Device code phishing is not just a new technique; it’s a sign of a more sophisticated and dangerous threat landscape. Organizations that prioritize proactive security measures and invest in user education will be best positioned to defend against these evolving attacks.

What are your thoughts on the future of phishing? Share your insights in the comments below!

December 20, 2025 0 comments
0 FacebookTwitterPinterestEmail
Newer Posts
Older Posts

Recent Posts

  • Cuestionando el Ritual Operístico: 194 Funciones

    April 28, 2026
  • Why Some People Are Mosquito Magnets: The Science Explained

    April 28, 2026
  • Mystery murder: Man shot dead tavern!

    April 28, 2026
  • US Defense Budget Set to Reach Record Highs Amid Global Spending Surge

    April 28, 2026
  • Rubio rejects new Iranian proposal to reopen Strait of Hormuz, with future of talks in limbo

    April 28, 2026

Popular Posts

  • 1

    Maya Jama flaunts her taut midriff in a white crop top and denim jeans during holiday as she shares New York pub crawl story

    April 5, 2025
  • 2

    Saar-Unternehmen hoffen auf tiefgreifende Reformen

    March 26, 2025
  • 3

    Marta Daddato: vita e racconti tra YouTube e podcast

    April 7, 2025
  • 4

    Unlocking Success: Why the FPÖ Could Outperform Projections and Transform Austria’s Political Landscape

    April 26, 2025
  • 5

    Mecimapro Apologizes for DAY6 Concert Chaos: Understanding the Controversy

    May 6, 2025

Follow Me

Follow Me
  • Cookie Policy
  • CORRECTIONS POLICY
  • PRIVACY POLICY
  • TERMS OF SERVICE

Hosted by Byohosting – Most Recommended Web Hosting – for complains, abuse, advertising contact: o f f i c e @byohosting.com


Back To Top
Newsy Today
  • Business
  • Entertainment
  • Health
  • News
  • Sport
  • Tech
  • World