Apple Cloud Security Linux Malware Phishing Ransomware Vulnerabilities Windows5 Min Read August 31, 2025 Week in review: 300k+ Plex Media Server instances still vulnerable to attack, exploited Git RCE flaw Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: 300k+ Plex Media Server…
Android Apple Cloud Security Identity and Access Management Linux Ransomware Spotlight Vulnerability Management Windows5 Min Read August 28, 2025 Innovator Spotlight: ManageEngine Unifying IT Management and Security with ManageEngine In today’s digital landscape, IT can feel like juggling flaming torches, one…
Apple Linux Vulnerabilities Windows2 Min Read August 28, 2025 Google Big Sleep AI Tool Finds Critical Chrome Vulnerability Google has patched a critical graphics library vulnerability in the Chrome browser, discovered by its AI-powered detection tool, Google Big…
Apple Linux Malware Network Vulnerabilities3 Min Read August 28, 2025 CISA Publish Hunting and Mitigation Guide to Defend Networks from Chinese State-Sponsored Actors The U.S. Cybersecurity and Infrastructure Security Agency (CISA), alongside the NSA, FBI, and a broad coalition of international partners, has…
Apple Linux Network3 Min Read August 28, 2025 Chinese State Hackers Target Global Critical Infrastructure, NSA Warns A coalition of cybersecurity and intelligence agencies from across the globe, including the United States National Security Agency (NSA), has…
Apple Linux Malware Ransomware Windows3 Min Read August 28, 2025 Researchers Discover First Reported AI-Powered Ransomware In what is reportedly a world-first, ESET researchers have discovered PrompLock, a generative AI-powered ransomware implant currently in…
Apple Linux Vulnerabilities Windows2 Min Read August 28, 2025 NVIDIA NeMo AI Curator Enables Code Execution and Privilege Escalation NVIDIA has issued a critical security bulletin addressing a high-severity vulnerability in its NeMo Curator platform that could allow…
Apple Linux Malware Vulnerabilities Windows2 Min Read August 28, 2025 300k+ Plex Media Server instances still vulnerable to attack via CVE-2025-34158 Over 300,000 internet-facing Plex Media Server instances are still vulnerable to attack via CVE-2025-34158, a critical vulnerability for which…
Linux Ransomware Vulnerabilities2 Min Read August 27, 2025 CISA Warns of Git Arbitrary File Write Vulnerability Exploited in Attacks CISA has issued a high-severity warning for CVE-2025-48384, a link-following vulnerability in Git that enables arbitrary file writes via…
Linux Network Ransomware Vulnerabilities Windows2 Min Read August 25, 2025 Critical Tableau Server Vulnerability Let Attackers Upload Malicious Files A critical security flaw in Tableau Server could enable attackers to upload and execute malicious files, potentially leading to complete…
August 25, 2025 MURKY PANDA: A Trusted-Relationship Threat in the Cloud Since late 2024, CrowdStrike Counter Adversary Operations has observed significant activity conducted by MURKY PANDA, a China-nexus adversary…
August 25, 2025 August 2025 Patch Tuesday: One Publicly Disclosed Zero-Day and 13 Critical Vulnerabilities Among 107 CVEs Microsoft has addressed 107 vulnerabilities in its August 2025 security update release. This month’s patches include fixes for one…
August 25, 2025 Shellshock: The Bash Bug That Shook the Internet Shellshock refers to a series of vulnerabilities in the GNU Bash (Bourne Again SHell), a command-line shell widely used in Unix-like systems,…
Apple Data Breach ICS/OT Linux Malware Network Phishing Ransomware Vulnerabilities Windows10 Min Read August 25, 2025 Weekly Cybersecurity News Recap : Apple 0-day, Chrome, Copilot Vulnerabilities and Cyber Attacks This past week was packed with high-severity disclosures and active exploitation reports across the global threat landscape. At the forefront,…
Linux Malware2 Min Read August 25, 2025 Apache ActiveMQ Flaw Exploited to Deploy DripDropper Malware on Cloud Linux Systems Threat actors are exploiting a nearly two-year-old security flaw in Apache ActiveMQ to gain persistent access to cloud Linux systems and…
Linux Threat Intelligence2 Min Read August 25, 2025 Hackers Found Using CrossC2 to Expand Cobalt Strike Beacon’s Reach to Linux and macOS Japan’s CERT coordination center (JPCERT/CC) on Thursday revealed it observed incidents that involved the use of a command-and-control…
Apple Linux Vulnerabilities Windows4 Min Read July 10, 2025 CVE-2025-48384: Git vulnerable to arbitrary file write on non-Windows systems Update - July 11, 2025: We are making a correction to the Git CLI versions vulnerable to this based on updates to the GitHub advisory around…
Exploits Linux Malware Ransomware8 Min Read May 7, 2025 RedisRaider: Weaponizing misconfigured Redis to mine cryptocurrency at scale Key points and observations Datadog Security Research has discovered a new Linux cryptojacking campaign, named RedisRaider, targeting publicly…