Recently patched RoundCube flaws now exploited in attacks
CISA flagged two Roundcube Webmail vulnerabilities as actively exploited in attacks and ordered U.S. federal agencies to patch them within three weeks. Roundcube Webmail is…
CISA flagged two Roundcube Webmail vulnerabilities as actively exploited in attacks and ordered U.S. federal agencies to patch them within three weeks. Roundcube Webmail is…
CISA has officially updated its Known Exploited Vulnerabilities (KEV) Catalog to include new security flaws affecting a popular webmail platform. On February 20, 2026, the…
Hewlett Packard Enterprise (HPE) has issued a security bulletin warning customers of a serious vulnerability in its Telco Service Activator product that could allow attackers to remotely…
If a strange email about a “payment detail request” or “signed bank document” lands in your inbox, your best bet is to delete it immediately.…
Former ASML CEO Peter Wennink has identified €126bn in investment potential across four strategic technology domains, but argues regulatory barriers are blocking deployment. His deregulation…
AI-powered campaign compromises 600 FortiGate systems worldwide Pierluigi Paganini February 23, 2026 A Russian-speaking cybercriminal used commercial generative AI tools to hack over 600 FortiGate…
New phishing framework Starkiller is enabling more convincing, scalable credential theft by proxying real login pages and bypassing multi-factor authentication (MFA), significantly raising the bar…
Cybersecurity researchers have disclosed what they say is an active “Shai-Hulud-like” supply chain worm campaign that has leveraged a cluster of at least 19 malicious…
Aussie Broadband has revised its strategic ambition for 2028 upward to have 1.5 million NBN broadband customers, half a million more than initially projected. This…
On February 20, 2026, the Cybersecurity and Infrastructure Security Agency (CISA) updated its Known Exploited Vulnerabilities (KEV) Catalog by adding two critical flaws in Roundcube…
Officers from Poland’s Central Bureau for Combating Cybercrime (CBZC) dismantled an organized group that used phishing to seize Facebook accounts and extract BLIK payment codes…
The most secure endpoints are secure by design, equipped from the outset with a purpose-built security platform that integrates deeply with contextual telemetry across the…