CISA Includes Erlang SSH and Roundcube Vulnerabilities in the Catalog of Known Exploited Threats
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has recently added two significant security vulnerabilities affecting Erlang/Open Telecom Platform (OTP) SSH and Roundcube to its Known Exploited Vulnerabilities (KEV)…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has recently added two significant security vulnerabilities affecting Erlang/Open Telecom Platform (OTP) SSH and Roundcube to its Known Exploited Vulnerabilities (KEV)…
Daily Encounter Rate of Mobile Scams Reaches 44%, According to Malwarebytes Research
The ownership of smartphones has increasingly become a source of concern. The prevalence of malicious text messages disguised as package delivery notifications, phishing emails that mimic reputable brands, and…
The ownership of smartphones has increasingly become a source of concern. The prevalence of malicious text messages disguised as package delivery notifications, phishing emails that mimic reputable brands, and…
Adobe Deploys Critical Patch Addressing 254 Vulnerabilities to Mitigate High-Severity Security Risks
Adobe has released significant security updates addressing a total of 254 vulnerabilities that affect its software portfolio, predominantly impacting Adobe Experience Manager (AEM). Out of these, 225 vulnerabilities are…
Adobe has released significant security updates addressing a total of 254 vulnerabilities that affect its software portfolio, predominantly impacting Adobe Experience Manager (AEM). Out of these, 225 vulnerabilities are…
Android Enterprise Introduces Enhanced Security and Productivity Updates
Android Enterprise has introduced a series of features designed to enhance mobile security, optimize device management, and increase user productivity. These advancements are timely as organizations increasingly depend on…
Android Enterprise has introduced a series of features designed to enhance mobile security, optimize device management, and increase user productivity. These advancements are timely as organizations increasingly depend on…
Evoke Wellness Agrees to $1.9 Million Settlement to Resolve FTC Allegations of Consumer Misleading in Substance Use Disorder Treatment Services
On June 10, inquiries were directed towards Evoke Wellness, located in Hilliard, Ohio, concerning reports of insider wrongdoing that were disseminated through local media channels, yet were conspicuously absent…
On June 10, inquiries were directed towards Evoke Wellness, located in Hilliard, Ohio, concerning reports of insider wrongdoing that were disseminated through local media channels, yet were conspicuously absent…
June 2025 Patch Tuesday: Microsoft Addresses 66 Vulnerabilities, Including Active Zero-Day Exploit
On June 2025, a significant Patch Tuesday was released, addressing a total of 66 vulnerabilities across Microsoft products. Among these, a notable zero-day vulnerability in WebDAV has been recognized,…
On June 2025, a significant Patch Tuesday was released, addressing a total of 66 vulnerabilities across Microsoft products. Among these, a notable zero-day vulnerability in WebDAV has been recognized,…
Owner of GirlsDoPorn Pleads Guilty to Sex Trafficking, Faces Life Imprisonment
Michael James Pratt, the proprietor of the adult websites GirlsDoPorn and GirlsDoToys, has entered a guilty plea to charges of sex trafficking in a United States court.
From 2013…
Michael James Pratt, the proprietor of the adult websites GirlsDoPorn and GirlsDoToys, has entered a guilty plea to charges of sex trafficking in a United States court.
From 2013…
DanaBot Malware Operators Unveiled Through 2022 Command and Control Vulnerability
A vulnerability introduced in the DanaBot malware operations with the June 2022 update has recently led to the exposure, indictment, and dismantling of their infrastructure as a result of…
A vulnerability introduced in the DanaBot malware operations with the June 2022 update has recently led to the exposure, indictment, and dismantling of their infrastructure as a result of…
Identification of Over 20 Configuration Vulnerabilities, Including Five CVEs, in Salesforce Industry Cloud
Cybersecurity researchers have identified more than 20 configuration-related vulnerabilities within Salesforce Industry Cloud, potentially jeopardizing sensitive data accessibility for unauthorized internal and external entities.
These vulnerabilities impact several components,…
Cybersecurity researchers have identified more than 20 configuration-related vulnerabilities within Salesforce Industry Cloud, potentially jeopardizing sensitive data accessibility for unauthorized internal and external entities.
These vulnerabilities impact several components,…
Mastery Schools Alerts 37,031 Individuals of Significant Data Breach
A ransomware attack has resulted in the compromise of personal data belonging to 37,031 individuals, as confirmed by Mastery Schools, the largest charter school network in Philadelphia. The incident,…
A ransomware attack has resulted in the compromise of personal data belonging to 37,031 individuals, as confirmed by Mastery Schools, the largest charter school network in Philadelphia. The incident,…
Former Hilliard Treatment Center Employee Allegedly Involved in Sale of Patient Data on Dark Web
Authorities in Hilliard, Ohio, are currently investigating a significant case of fraud and identity theft linked to a former employee of a local addiction treatment center. This individual is…
Authorities in Hilliard, Ohio, are currently investigating a significant case of fraud and identity theft linked to a former employee of a local addiction treatment center. This individual is…
Two Mirai Botnets, Lzrd and Resgod, Detected Exploiting Vulnerabilities in Wazuh System
Akamai’s recent analysis has identified two distinct Mirai botnets actively exploiting the significant vulnerability identified as CVE-2025-24016 within the Wazuh framework. This critical flaw presents a serious threat, particularly…
Akamai’s recent analysis has identified two distinct Mirai botnets actively exploiting the significant vulnerability identified as CVE-2025-24016 within the Wazuh framework. This critical flaw presents a serious threat, particularly…
Vulnerability in Google Platform Exposed User Phone Numbers to Unauthorized Detection
Google has addressed vulnerabilities that exposed the phone numbers associated with nearly any Google account. This issue was identified within the account recovery process, which allows users to regain…
Google has addressed vulnerabilities that exposed the phone numbers associated with nearly any Google account. This issue was identified within the account recovery process, which allows users to regain…
ConnectWise Implements Enhanced Code Signing Certificate Rotation to Address Security Vulnerabilities
ConnectWise is notifying its customers about the upcoming rotation of digital code signing certificates for its ScreenConnect, ConnectWise Automate, and ConnectWise RMM executables due to security concerns.
Digital certificates…
ConnectWise is notifying its customers about the upcoming rotation of digital code signing certificates for its ScreenConnect, ConnectWise Automate, and ConnectWise RMM executables due to security concerns.
Digital certificates…
INTERPOL Neutralizes Over 20,000 Malicious IP Addresses Associated with 69 Malware Variants in Operation Secure
INTERPOL has reported the successful dismantling of over 20,000 malicious IP addresses and domains associated with 69 information-stealing malware variants. This initiative, codenamed Operation Secure, was executed from January…
INTERPOL has reported the successful dismantling of over 20,000 malicious IP addresses and domains associated with 69 information-stealing malware variants. This initiative, codenamed Operation Secure, was executed from January…
Congress Introduces Legislation to Enhance Cybersecurity in Healthcare Sector
US legislators have introduced a new Healthcare Cybersecurity Bill, aimed at enhancing the federal government’s capacity to prevent and respond to breaches of American medical data.
Introduced by Congressman…
US legislators have introduced a new Healthcare Cybersecurity Bill, aimed at enhancing the federal government’s capacity to prevent and respond to breaches of American medical data.
Introduced by Congressman…
Dutch Law Enforcement Identifies Users on Cracked.io
Excerpts from a recent press release by the Dutch Police indicate significant developments following thorough investigations conducted by the Cybercrime Team of the Zeeland-West-Brabant unit. These investigations revealed that…
Excerpts from a recent press release by the Dutch Police indicate significant developments following thorough investigations conducted by the Cybercrime Team of the Zeeland-West-Brabant unit. These investigations revealed that…
Operation Secure: INTERPOL Takes Down 20,000 Infostealer Domains and Arrests 32 Individuals
In a significant operation targeting cybercrime, INTERPOL has successfully disrupted 20,000 infostealer domains across the Asia-Pacific region. This extensive crackdown has resulted in the arrest of 32 individuals linked…
In a significant operation targeting cybercrime, INTERPOL has successfully disrupted 20,000 infostealer domains across the Asia-Pacific region. This extensive crackdown has resulted in the arrest of 32 individuals linked…
Congress Critiques 23andMe on Privacy Practices and Sale of Genetic Data
During a recent Senate hearing titled “23 and You: The Privacy and National Security Implications of the 23andMe Bankruptcy,” executives from 23andMe addressed significant concerns regarding the privacy ramifications…
During a recent Senate hearing titled “23 and You: The Privacy and National Security Implications of the 23andMe Bankruptcy,” executives from 23andMe addressed significant concerns regarding the privacy ramifications…
SmartAttack Utilizes Smartwatch Technology to Compromise Air-Gapped Systems
A new method known as ‘SmartAttack’ leverages smartwatches to act as covert ultrasonic signal receivers, enabling the exfiltration of data from air-gapped systems.
Air-gapped systems, designed for high-security environments…
A new method known as ‘SmartAttack’ leverages smartwatches to act as covert ultrasonic signal receivers, enabling the exfiltration of data from air-gapped systems.
Air-gapped systems, designed for high-security environments…