Hackers target Malaysia’s EV boom, cybersecurity flaws revealed
Hackers are increasingly targeting Malaysia’s growing automotive sector, cybersecurity experts have warned in a new report that raises alarm over gaps in threat detection, including…
Hackers are increasingly targeting Malaysia’s growing automotive sector, cybersecurity experts have warned in a new report that raises alarm over gaps in threat detection, including…
Over 1,000 exposed and unpatched N-able N-central Remote Monitoring and Management (RMM) servers are vulnerable to two newly disclosed zero-day vulnerabilities – CVE-2025-8875 and CVE-2025-8876. …
18 Aug The $10.5 Trillion Shadow Economy and the Cybersecurity Gold Rush Posted at 08:38h in Blogs by Taylor Fox This week in cybersecurity from…
Cybersecurity researchers have discovered a malicious package in the Python Package Index (PyPI) repository that introduces malicious behavior through a dependency that allows it to…
Colt Technology Services, a major UK-based telecommunications provider, continues to experience service disruptions following a serious cyberattack that began on August 12. The Colt cyberattack…
China’s cyberspace regulator has summoned Nvidia to explain whether its H20 chips have any “back-door safety” risks, casting a shadow over the US chip giant’s…
Microsoft has mitigated a known issue that caused Windows update failures when installing them from a network share using the Windows Update Standalone Installer (WUSA).…
The PostgreSQL Global Development Group has issued emergency security updates across all supported versions to address three critical vulnerabilities that could allow attackers to execute…
WarLock ransomware claims breach at Colt and Hitachi, with Colt investigating and working to restore systems while experts review the alleged data theft. When a…
Use-after-free (UAF) vulnerabilities represent one of the most critical and prevalent security threats in modern software systems, particularly affecting applications written in memory-unsafe languages like…
Chinese-speaking cybercriminals are using ghost-tapping techniques to take advantage of Near Field Communication (NFC) relay tactics in a sophisticated evolution of payment card fraud. They…
Aug 18, 2025The Hacker NewsData Breach / Regulatory Compliance Organizations handling various forms of sensitive data or personally identifiable information (PII) require adherence to regulatory…