What Businesses Need to Know
When businesses start accepting crypto payments, security is often one of the first concerns. This is completely understandable. Crypto works differently from traditional payments, and…
When businesses start accepting crypto payments, security is often one of the first concerns. This is completely understandable. Crypto works differently from traditional payments, and…
Dec 18, 2025Ravie LakshmananVulnerability / Network Security Cisco has alerted users to a maximum-severity zero-day flaw in Cisco AsyncOS software that has been actively exploited…
Threat actors launched a coordinated brute-force campaign against enterprise VPN gateways, hammering Palo Alto Networks GlobalProtect portals and Cisco SSL VPN endpoints with millions of…
Enterprise-Grade Disaster Recovery and MSP Capabilities Now Available NAKIVO, a leading provider of data protection solutions, has released NAKIVO Backup & Replication v11.1, marking a significant…
An active campaign exploiting a zero-day vulnerability in Cisco AsyncOS Software, targeting Secure Email Gateway (formerly Email Security Appliance, ESA) and Secure Email and Web…
Security teams are being urged to act immediately following confirmation that two newly disclosed Fortinet vulnerabilities are being actively exploited in the wild, according to…
Thousands of users in Japan and China faced widespread access and sign-in disruptions to Microsoft 365 and Copilot services early Thursday, stemming from a critical…
An investigation into the Optus triple zero outage has revealed it can take up to a minute for an emergency call to be re-routed over…
A sophisticated malware campaign dubbed “GhostPoster” has compromised approximately 50,000 Firefox users by exploiting browser extension icons. Security researchers at Koi Security discovered that malicious…
France is now dealing with one of its most serious public sector cybersecurity incidents in recent years, after the Interior Ministry confirmed that attackers breached…
As Australia’s new restrictions on social media use by children under 16 take effect this month, governments across Southeast Asia are rolling out or weighing…
The Cybersecurity and Infrastructure Security Agency (CISA) has officially added CVE-2025-59718 to its Known Exploited Vulnerabilities (KEV) catalog, marking the latest Fortinet vulnerability being actively…