search

LEMON BLOG

Stay informed on the latest threats, trends, and solutions to protect your digital world. Explore expert tips, news, and insights to secure your data and systems.

SonicWall SMA100 Appliances Under Active Attack: What You Need to Know

If your organization uses SonicWall's Secure Mobile Access (SMA100) appliances, it's time to take action. SonicWall has confirmed that cyber attackers are actively exploiting two serious vulnerabilities in these devices, prompting warnings from both the company and the U.S. Cybersecurity and Infrastructure Security Agency (CISA). Here's what's happening and what you need to do.

Continue reading

Estimating the Financial Impact of Data Breaches in Malaysia's Healthcare Sector

In today's digital age, the healthcare industry is increasingly reliant on electronic data, making it a prime target for cyberattacks. Understanding the potential financial ramifications of data breaches is crucial for healthcare organizations, especially in Malaysia, where specific data is limited but the risks are substantial.

Continue reading

Australia's Largest Pension Funds Targeted in Widespread Cyberattacks

A series of coordinated cyberattacks has hit some of Australia's largest pension funds, compromising tens of thousands of member accounts and resulting in financial losses for several individuals, according to sources familiar with the situation.

Continue reading

Massive Data Breach Reportedly Exposes Emails of 200 Million X Users

A major data breach reportedly hit the social media platform X (formerly Twitter) over the weekend, potentially affecting up to 2.8 billion user accounts—making it one of the most significant leaks in social media history.

Continue reading

Zero-Day Windows Shortcut Exploit Used by State-Backed Hackers Since 2017

A newly disclosed zero-day vulnerability in Windows shortcut files (.lnk) has been exploited in-the-wild for several years by state-sponsored hacking groups. Identified as ZDI-CAN-25373, the flaw allows attackers to silently execute malicious commands using shortcut files—making it difficult to detect through traditional security tools.

Security researchers revealed that this vulnerability has been abused since at least 2017 by advanced persistent threat (APT) groups linked to 11 different countries. 

Continue reading

QUICK ACCESS

 LEMON Blog Articles

 LEMON Services

LEMON Web-Games

LEMON Web-Apps