UK Considers New Enterprise IoT Security Legislation
The UK government has initiated a Call for Views in response to a newly released study highlighting significant security vulnerabilities within enterprise Internet of Things (IoT) products. This initiative…
The UK government has initiated a Call for Views in response to a newly released study highlighting significant security vulnerabilities within enterprise Internet of Things (IoT) products. This initiative…
Mitigating Deepfake Threats in the Era of Artificial Intelligence
The cybersecurity landscape has undergone significant transformation due to the emergence of generative AI technologies. Adversaries are increasingly employing large language models (LLMs) to impersonate trusted entities and automate…
The cybersecurity landscape has undergone significant transformation due to the emergence of generative AI technologies. Adversaries are increasingly employing large language models (LLMs) to impersonate trusted entities and automate…
Exploitation of Output Messenger Vulnerability as Zero-Day in Advanced Espionage Campaigns
A Türkiye-backed cyber-espionage group has effectively exploited a zero-day vulnerability in Output Messenger, targeting users connected to the Kurdish military in Iraq. This vulnerability, identified as CVE-2025-27920, pertains to…
A Türkiye-backed cyber-espionage group has effectively exploited a zero-day vulnerability in Output Messenger, targeting users connected to the Kurdish military in Iraq. This vulnerability, identified as CVE-2025-27920, pertains to…
Arrest of Suspect in €4.5 Million Ransomware Attack Targeting Dutch Research Institution by Moldovan Authorities
Moldovan law enforcement authorities have taken into custody a 45-year-old foreign national suspected of orchestrating multiple ransomware attacks against Dutch enterprises in 2021. According to official statements, this individual…
Moldovan law enforcement authorities have taken into custody a 45-year-old foreign national suspected of orchestrating multiple ransomware attacks against Dutch enterprises in 2021. According to official statements, this individual…
CISA Implements New Alert Distribution Strategy via Email and Social Media
The US Cybersecurity and Infrastructure Security Agency (CISA) has implemented a notable change in its distribution strategy for cybersecurity alerts. Moving forward, standard update announcements will no longer be…
The US Cybersecurity and Infrastructure Security Agency (CISA) has implemented a notable change in its distribution strategy for cybersecurity alerts. Moving forward, standard update announcements will no longer be…
China-Linked Advanced Persistent Threats Exploit SAP Vulnerability CVE-2025-31324 to Compromise 581 Critical Systems Globally
A recently identified critical security vulnerability affecting SAP NetWeaver is currently being exploited by various nation-state actors with ties to China, posing a significant threat to essential infrastructure networks.…
A recently identified critical security vulnerability affecting SAP NetWeaver is currently being exploited by various nation-state actors with ties to China, posing a significant threat to essential infrastructure networks.…
Ivanti Addresses Critical EPMM Zero-Day Vulnerabilities Exploited in Code Execution Attacks
Ivanti has alerted its clientele regarding critical security vulnerabilities identified in the Ivanti Endpoint Manager Mobile (EPMM) software, emphasizing the urgency of applying patches to mitigate risks associated with…
Ivanti has alerted its clientele regarding critical security vulnerabilities identified in the Ivanti Endpoint Manager Mobile (EPMM) software, emphasizing the urgency of applying patches to mitigate risks associated with…
Turkey-Aligned Hackers Exploit Zero-Day Vulnerability to Target Iraqi Kurdish Entities
A cyber threat actor, believed to have connections with Turkish governmental interests, has been detected exploiting unpatched user accounts affected by a vulnerability (CVE-2025-27920) in Output Messenger, a multiplatform…
A cyber threat actor, believed to have connections with Turkish governmental interests, has been detected exploiting unpatched user accounts affected by a vulnerability (CVE-2025-27920) in Output Messenger, a multiplatform…
Zoom Addresses Critical Vulnerability in Recent Update
Zoom has addressed several security vulnerabilities within its Workplace Apps, including a particularly high-risk flaw. The company is urging users to promptly update their applications to mitigate potential risks…
Zoom has addressed several security vulnerabilities within its Workplace Apps, including a particularly high-risk flaw. The company is urging users to promptly update their applications to mitigate potential risks…
International Cybercrime Addressed: Amsterdam Police and FBI Successfully Neutralize Proxy Service Anyproxy
In a significant international operation, law enforcement authorities from Amsterdam, in collaboration with the Public Prosecution Service and the U.S. Federal Bureau of Investigation (FBI), have successfully dismantled the…
In a significant international operation, law enforcement authorities from Amsterdam, in collaboration with the Public Prosecution Service and the U.S. Federal Bureau of Investigation (FBI), have successfully dismantled the…
Compromised PyPI Package Imitating Solana Tool Leads to Source Code Exfiltration in 761 Instances
Cybersecurity researchers have identified a malicious package within the Python Package Index (PyPI) repository, masquerading as an application related to the Solana blockchain. This package, termed solana-token, has been…
Cybersecurity researchers have identified a malicious package within the Python Package Index (PyPI) repository, masquerading as an application related to the Solana blockchain. This package, termed solana-token, has been…
SAP Addresses Second Zero-Day Vulnerability Targeted in Recent Attack Campaigns
SAP has released critical security patches to address a second vulnerability that has been exploited in recent attacks targeting SAP NetWeaver servers. The new vulnerability, identified as CVE-2025-42999, was…
SAP has released critical security patches to address a second vulnerability that has been exploited in recent attacks targeting SAP NetWeaver servers. The new vulnerability, identified as CVE-2025-42999, was…
DPRK-Backed TA406 Conducts Malicious Campaigns Against Ukraine
A new cyber espionage campaign has emerged, targeting Ukrainian government entities, according to recent findings from cybersecurity researchers. This operation has been linked to the North Korean state-aligned threat…
A new cyber espionage campaign has emerged, targeting Ukrainian government entities, according to recent findings from cybersecurity researchers. This operation has been linked to the North Korean state-aligned threat…
CISA Includes TeleMessage Vulnerability in KEV List After Security Breach
CISA has officially added a vulnerability found in TeleMessage to its Known Exploited Vulnerabilities (KEV) list. This decision comes in light of a recent breach that compromised multiple organizations,…
CISA has officially added a vulnerability found in TeleMessage to its Known Exploited Vulnerabilities (KEV) list. This decision comes in light of a recent breach that compromised multiple organizations,…
Investigation Initiated into N.W.T. Medical Record System Following Two Reported Incidents of Unauthorized Access
Medical records represent some of the most sensitive information managed by government agencies. Recent incidents involving employees of the Northwest Territories Health and Social Services Authority underscore the vulnerability…
Medical records represent some of the most sensitive information managed by government agencies. Recent incidents involving employees of the Northwest Territories Health and Social Services Authority underscore the vulnerability…
North Korean Konni APT Leverages Malware to Monitor Developments in the Russian Invasion of Ukraine
The North Korean threat actor known as Konni APT has recently been implicated in a phishing campaign targeting government entities in Ukraine, expanding its focus beyond previous targets in…
The North Korean threat actor known as Konni APT has recently been implicated in a phishing campaign targeting government entities in Ukraine, expanding its focus beyond previous targets in…
North Korea Intensifies Cyber Espionage Activities in Ukraine to Evaluate Conflict Risks
The state-sponsored North Korean hacking group known as Konni (also referred to as Opal Sleet or TA406) has intensified its cyber espionage operations directed at Ukrainian governmental organizations. This…
The state-sponsored North Korean hacking group known as Konni (also referred to as Opal Sleet or TA406) has intensified its cyber espionage operations directed at Ukrainian governmental organizations. This…
European Vulnerability Database Introduced in Response to US CVE Disruptions
Europe’s cybersecurity agency has officially launched a comprehensive vulnerability database initiative, aimed to aid network defenders amidst ongoing challenges in the U.S. vulnerability management sector.
The new European Vulnerability…
Europe’s cybersecurity agency has officially launched a comprehensive vulnerability database initiative, aimed to aid network defenders amidst ongoing challenges in the U.S. vulnerability management sector.
The new European Vulnerability…
Data Breach: Exposure of Information from 3 Million Students and Coaches in PrepHero-Linked Database
A recent security breach at PrepHero, a college recruiting platform, has resulted in the exposure of millions of unencrypted records, encompassing sensitive personal information of users. This incident raises…
A recent security breach at PrepHero, a college recruiting platform, has resulted in the exposure of millions of unencrypted records, encompassing sensitive personal information of users. This incident raises…
Microsoft Addresses 78 Vulnerabilities, Including 5 Exploited Zero-Day Threats; Critical CVSS 10 Vulnerability Affects Azure DevOps Server
Microsoft has released updates to address 78 security vulnerabilities across its software ecosystem, including five critical zero-day vulnerabilities currently under active exploitation.
Among the resolved vulnerabilities, 11 have been…
Microsoft has released updates to address 78 security vulnerabilities across its software ecosystem, including five critical zero-day vulnerabilities currently under active exploitation.
Among the resolved vulnerabilities, 11 have been…