SonicWall NetExtender Trojan and ConnectWise Exploits
25
Jun
2025

SonicWall NetExtender Trojan and ConnectWise Exploits Used in Remote Access Attacks

Jun 25, 2025Ravie LakshmananVPN Security / Malware Unknown threat actors have been distributing a trojanized version of SonicWall’s SSL VPN…

Google Plans to Remove Chrome’s Tab Scrolling Feature
25
Jun
2025

Google Plans to Remove Chrome’s Tab Scrolling Feature

Google has decided to deprecate the “Tab Scrolling” feature in its Chrome browser, marking the end of a tool that…

Critical Kibana Flaws Enable Heap Corruption and Remote Code Execution
25
Jun
2025

Critical Kibana Flaws Enable Heap Corruption and Remote Code Execution

A critical security flaw has been uncovered in Kibana, the popular data visualization platform for the Elastic Stack, exposing organizations…

NPM Supply Chain Attack
25
Jun
2025

North Korea-linked Supply Chain Attack Targets Developers with 35 Malicious npm Packages

Jun 25, 2025Ravie LakshmananMalware / Open Source Cybersecurity researchers have uncovered a fresh batch of malicious npm packages linked to…

Prometei botnet activity has surged since March 2025
25
Jun
2025

Prometei botnet activity has surged since March 2025

Prometei botnet activity has surged since March 2025 Pierluigi Paganini June 25, 2025 Prometei botnet activity has surged since March…

TeamViewer for Windows Vulnerability Lets Hackers Delete Files with SYSTEM Rights
25
Jun
2025

TeamViewer for Windows Vulnerability Lets Hackers Delete Files with SYSTEM Rights

A critical security vulnerability has been discovered in TeamViewer Remote Management for Windows, exposing systems to potential privilege escalation attacks….

New WordPress Malware Hides on Checkout Pages and Imitates Cloudflare
25
Jun
2025

New WordPress Malware Hides on Checkout Pages and Imitates Cloudflare

Cybersecurity researchers have discovered a highly advanced malware campaign targeting WordPress websites, capable of stealing credit card details, user logins,…

CISA Releases New ICS Advisories Highlighting Ongoing Threats and Exploits
25
Jun
2025

CISA Releases New ICS Advisories Highlighting Ongoing Threats and Exploits

The Cybersecurity and Infrastructure Security Agency (CISA) has released eight new Industrial Control Systems (ICS) advisories on June 24, 2025,…

Companies negotiate their way to lower ransom payments
25
Jun
2025

Companies negotiate their way to lower ransom payments

Nearly 50% of companies paid the ransom to recover their data, the second-highest rate in six years, according to Sophos….

NVIDIA Megatron LM Flaw Allows Attackers to Inject Malicious Code
25
Jun
2025

NVIDIA Megatron LM Flaw Allows Attackers to Inject Malicious Code

NVIDIA has issued an urgent security update for its open-source Megatron-LM framework, following the discovery of two critical vulnerabilities that…

The tiny amplifier that could supercharge quantum computing
25
Jun
2025

The tiny amplifier that could supercharge quantum computing

Quantum computers are built to handle problems that are far too complex for today’s machines. They could lead to major…

Microsoft Extends Windows 10 Security Updates for One Year with New Enrollment Options
25
Jun
2025

Microsoft Extends Windows 10 Security Updates for One Year with New Enrollment Options

Jun 25, 2025Ravie LakshmananEndpoint Security / IT Management Microsoft on Tuesday announced that it’s extending Windows 10 Extended Security Updates…