Android Apple Linux Malware Ransomware Vulnerabilities Windows3 Min Read September 9, 2025 Microsoft Patch Tuesday, September 2025 Edition Microsoft Corp. today issued security updates to fix more than 80 vulnerabilities in its Windows operating systems and software. There are no…
Linux Vulnerabilities Windows2 Min Read September 9, 2025 Microsoft Patch Tuesday September 2025 Fixes Risky Kernel Flaws Three high-risk Windows kernel flaws were among the fixes included in Microsoft’s September 2025 Patch Tuesday updates released today.…
Black Hat 2025 Ransomware Spotlight Windows Xcape4 Min Read September 9, 2025 Innovator Spotlight: Xcape Continuous Vulnerability Management: The New Cybersecurity Imperative Security leaders are drowning in data but starving for actionable…
Cloud Security DDoS Linux Network Vulnerabilities Windows6 Min Read September 9, 2025 The September 2025 Security Update Review There’s a crispness in the air – at least here in North America – and with it comes the latest security patches from Adobe…
Apple Cloud Security DDoS Linux Network Vulnerabilities Windows7 Min Read September 9, 2025 Microsoft September 2025 Patch Tuesday – 81 Vulnerabilities Fixed Including 22 RCE Microsoft has released its September 2025 Patch Tuesday updates, addressing a total of 81 security vulnerabilities across its product suite.…
Apple DDoS Ransomware Vulnerabilities Windows2 Min Read September 9, 2025 Zoom Security Update – Patch for Multiple Vulnerabilities in Clients for Windows and macOS Zoom released a security update addressing multiple vulnerabilities in its software, including Zoom Workplace and various clients for Windows…
Phishing Windows2 Min Read September 9, 2025 Axios User Agent Helps Automate Phishing on “Unprecedented Scale” Security experts have warned of a huge uptick in automated phishing activity abusing the Axios user agent and Microsoft’s Direct Send…
Malware Phishing Ransomware Windows2 Min Read September 9, 2025 Chinese Cyber Espionage Campaign Impersonates US Congressman US lawmakers have accused the Chinese government of being behind a cyber espionage campaign that impersonated a prominent Congressman. The…
Malware Phishing Ransomware Windows2 Min Read September 8, 2025 MostereRAT Targets Windows Users With Stealth Tactics A phishing campaign delivering a new strain of malware, MostereRAT, has been uncovered by cybersecurity researchers. The Remote Access Trojan…
Network Ransomware Vulnerabilities Windows2 Min Read September 8, 2025 Remote Access Abuse Biggest Pre-Ransomware Indicator Abuses of remote access software and services are the most common ‘pre-ransomware’ indicators, according to new research from…
Cloud Security DDoS Linux Ransomware Windows2 Min Read September 1, 2025 Another Ryzen 9000 CPU Burnout: What’s Really Going On? Ddos September 1, 2025 Earlier this year, reports emerged of Asrock motherboards paired with processors such as the 9800X3D suffering…
Apple Cloud Security Data Breach Ransomware Vulnerabilities Windows4 Min Read September 1, 2025 WhatsApp warns of 'attack against specific targeted users' Infosec In brief A flaw in Meta’s WhatsApp app “may have been exploited in a sophisticated attack against specific targeted…
Cloud Security DDoS Vulnerabilities Windows2 Min Read September 1, 2025 CVE-2024-58259: DoS Flaw in Rancher Manager Allows Unauthenticated Attackers to Crash Servers Ddos September 1, 2025 The SUSE Rancher Security Team has issued a security advisory addressing a high-severity vulnerability in Rancher…
Android Data Breach ICS/OT Linux Malware Network Phishing Ransomware Vulnerabilities Windows9 Min Read August 31, 2025 Weekly Cybersecurity News Recap : WhatsApp, Chrome 0-Day, AI Ransomware and Cyber Attacks Welcome to your Weekly Cybersecurity News Recap. This week, the digital world faced a fresh wave of threats, underscoring the relentless…
Apple Cloud Security Linux Malware Phishing Ransomware Vulnerabilities Windows5 Min Read August 31, 2025 Week in review: 300k+ Plex Media Server instances still vulnerable to attack, exploited Git RCE flaw Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: 300k+ Plex Media Server…
DDoS Network Ransomware Vulnerabilities Windows2 Min Read August 30, 2025 BadSuccessor (CVE-2025-53779) Technique Persists Despite Microsoft Patch Ddos August 30, 2025 At DEF CON 2025, Akamai security researcher Yuval Gordon revealed the story of BadSuccessor (CVE-2025-53779), an Active…
Apple DDoS Malware Network Ransomware Vulnerabilities Windows2 Min Read August 30, 2025 MystRodX: A Stealthy New Backdoor Found Hiding in Networks for Over 20 Months Ddos August 30, 2025 XLab has identified a previously unknown and stealthy backdoor dubbed MystRodX, capable of operating undetected in…
Malware Network Phishing Ransomware Vulnerabilities Windows4 Min Read August 29, 2025 The Good, the Bad and the Ugly in Cybersecurity – Week 35 The Good | Interpol Cracks Down on Cybercrime as U.S. Sanctions North Korean IT Scheme Interpol announced the arrest of over 1200 suspects in…
Malware Phishing Ransomware Windows4 Min Read August 29, 2025 North Korean Hackers Weaponize Seoul Intelligence Files to Target South Koreans A large-scale spear-phishing campaign targeting South Korean government and intelligence staff has exploited a national intelligence…
Malware Ransomware Vulnerabilities Windows3 Min Read August 29, 2025 State-Sponsored Hackers Behind Majority of Vulnerability Exploits The majority (53%) of attributed vulnerability exploits in the first half 2025 were conducted by state-sponsored actors for strategic,…
Android Apple Cloud Security Identity and Access Management Linux Ransomware Spotlight Vulnerability Management Windows5 Min Read August 28, 2025 Innovator Spotlight: ManageEngine Unifying IT Management and Security with ManageEngine In today’s digital landscape, IT can feel like juggling flaming torches, one…
Ransomware Vulnerabilities Windows2 Min Read August 28, 2025 BadSuccessor Post-Patch: Leveraging dMSAs for Credential Acquisition and Lateral Movement in Active Directory Microsoft’s recent patch for the BadSuccessor vulnerability (CVE-2025-53779) has successfully closed the direct privilege escalation…
Malware Phishing Ransomware Vulnerabilities Windows2 Min Read August 28, 2025 Fake IT Support Attacks Hit Microsoft Teams A new wave of phishing attacks abusing Microsoft Teams to deliver malware has been uncovered by security researchers. The campaigns, observed…
Malware Phishing Vulnerabilities Windows3 Min Read August 28, 2025 ShadowSilk Leveraging Penetration-Testing Tools, Public Exploits to Attack Organizations ShadowSilk first surfaced in late 2023 as a sophisticated threat cluster targeting government entities across Central Asia and the broader…
Malware Ransomware Windows2 Min Read August 28, 2025 Malicious VS Code Extensions Exploit Name Reuse Loophole A new campaign involving malicious Visual Studio Code (VS Code) extensions has exposed a loophole in the VS Code Marketplace that allows…
Apple Linux Vulnerabilities Windows2 Min Read August 28, 2025 Google Big Sleep AI Tool Finds Critical Chrome Vulnerability Google has patched a critical graphics library vulnerability in the Chrome browser, discovered by its AI-powered detection tool, Google Big…
Malware Phishing Ransomware Vulnerabilities Windows3 Min Read August 28, 2025 When Best Practices Aren’t Enough: UK Breaches Underscore the Importance of Compromise Assessments Despite extensive guidance from national authorities, several prominent UK organizations have recently suffered significant cyber attacks.…
Cloud Security Malware Ransomware Windows4 Min Read August 28, 2025 Ransomware Actor Deletes Data and Backups Post-Exfiltration on Azure A threat actor has destroyed data and backups following exfiltration in a victim’s Microsoft Azure environment in a novel cloud-based…
Apple Linux Malware Ransomware Windows3 Min Read August 28, 2025 Researchers Discover First Reported AI-Powered Ransomware In what is reportedly a world-first, ESET researchers have discovered PrompLock, a generative AI-powered ransomware implant currently in…
Malware Ransomware Vulnerabilities Windows4 Min Read August 28, 2025 Emulating the Expedited Warlock Ransomware Introduction Warlock is a ransomware strain operating under the Ransomware-as-a-Service (RaaS) model that emerged in June 2025, following an…
Apple Linux Vulnerabilities Windows2 Min Read August 28, 2025 NVIDIA NeMo AI Curator Enables Code Execution and Privilege Escalation NVIDIA has issued a critical security bulletin addressing a high-severity vulnerability in its NeMo Curator platform that could allow…
Vulnerabilities Windows2 Min Read August 28, 2025 New Zip Slip Vulnerability Allows Attackers to Manipulate ZIP Files During Decompression A newly observed variant of the Zip Slip vulnerability has emerged, enabling threat actors to exploit path traversal flaws in widely used…
Apple Ransomware Vulnerabilities Windows2 Min Read August 28, 2025 Docker Desktop Vulnerability Allowed Host Takeover on Windows, macOS A critical vulnerability (CVE-2025-9074) in Docker Desktop for Windows and macOS was fixed. The flaw allowed a malicious container to escape…
Apple Linux Malware Vulnerabilities Windows2 Min Read August 28, 2025 300k+ Plex Media Server instances still vulnerable to attack via CVE-2025-34158 Over 300,000 internet-facing Plex Media Server instances are still vulnerable to attack via CVE-2025-34158, a critical vulnerability for which…
Android Data Breach Malware Phishing Ransomware Windows4 Min Read August 27, 2025 HOOK Android Trojan Adds Ransomware Overlays, Expands to 107 Remote Commands Cybersecurity researchers have discovered a new variant of an Android banking trojan called HOOK that features ransomware-style overlay…
DDoS Identity Security Phishing Ransomware ThreatLocker Windows8 Min Read August 27, 2025 Black Hat Ignites Under Vegas Lights Driving through the quiet, endless beauty of the Nevada desert, I let the raspy voice of Jim Morrison carry me forward. “The End”…
Ransomware Vulnerabilities Windows3 Min Read August 26, 2025 Microst Restricts MAPP with China The summer of 2025 brought a seismic shift in the way Microsoft engages with the global cybersecurity community. At the heart of the story: a…
Malware Ransomware Windows2 Min Read August 26, 2025 Onderzoeker: ransomware-aanval op telecombedrijf Colt via SharePoint-server De ransomware-aanval op het Britse telecombedrijf Colt heeft plaatsgevonden via een gecompromitteerde SharePoint-server, zo stelt…
August 26, 2025 Ten Years of Resilience, Innovation & Community-Driven Defense The world of cybersecurity has been a wild ride over the last decade. As attackers stepped up their game year over year, the security…
ICS/OT Ransomware Windows2 Min Read August 26, 2025 Tech Manufacturer Data I/O Hit by Ransomware A leading data and security programming specialist is scrambling to restore operations after a ransomware incident, a new regulatory filing…
Malware Network Phishing Ransomware Vulnerabilities Windows2 Min Read August 26, 2025 Chinese APT Hackers Using Proxy and VPN Service to Anonymize Infrastructure In recent months, cybersecurity researchers have observed a surge in targeted campaigns by a sophisticated Chinese APT group leveraging…
Linux Network Ransomware Vulnerabilities Windows2 Min Read August 25, 2025 Critical Tableau Server Vulnerability Let Attackers Upload Malicious Files A critical security flaw in Tableau Server could enable attackers to upload and execute malicious files, potentially leading to complete…