Photo: Shutterstock Images
19
Aug
2025

China rolls out ‘voluntary’ cyber ID system amid concerns over privacy, censorship

China has officially introduced a controversial national cyber ID system, despite concerns from some experts and netizens over privacy and…

Technical Details of SAP 0-Day Exploitation Script Used to Achieve RCE Disclosed
19
Aug
2025

Technical Details of SAP 0-Day Exploitation Script Used to Achieve RCE Disclosed

A sophisticated zero-day exploitation script targeting SAP systems has emerged in the cybersecurity landscape, demonstrating advanced remote code execution capabilities…

Flight Centre Corporate now has a single observability strategy and tool
19
Aug
2025

Flight Centre Corporate now has a single observability strategy and tool

Flight Centre’s Corporate travel division has elevated observability from a technical tool to a strategic platform that supports its productivity…

FCC Chairman Brendan Carr delivers a speech at the Mobile World Congress in Barcelona in March 2025. Photo: AFP
19
Aug
2025

US aims to ban Chinese technology in undersea telecoms cables

The US Federal Communications Commission said on Wednesday it plans to adopt rules to bar companies from connecting undersea submarine…

Travel eSIMs secretly route traffic over Chinese and undisclosed networks: study
19
Aug
2025

Travel eSIMs secretly route traffic over Chinese and undisclosed networks: study

A security study has unearthed security concerns for travel electronic subscriber identity modules (eSIMs), showing that many providers route user…

Ukrainian President Volodymyr Zelensky in Switzerland in 2024. File photo: EPA-EFE
19
Aug
2025

Europol-led global operation takes down pro-Russian cybercrime network

A coordinated international operation has hit the infrastructure of a pro-Russian cybercrime network linked to a string of denial of…

TPG Telecom reveals iiNet order management system breached
19
Aug
2025

TPG Telecom reveals iiNet order management system breached

TPG Telecom has revealed that iiNet’s order management system was breached by an unknown attacker who abused legitimate credentials to…

Microsoft to stop using engineers in China as tech support for US military
19
Aug
2025

Microsoft to stop using engineers in China as tech support for US military

Microsoft on Friday said it will stop using China-based engineers to provide technical help to the US military after a…

™
19
Aug
2025

New EMA Research Highlights Keeper’s Strength in Modern PAM

Keeper Security has announced the release of a new global survey report from Enterprise Management Associates (EMA), Beyond the Vault: Elevating…

Google Gmail app password
19
Aug
2025

How to spot the latest fake Gmail security alerts

Security alerts from tech companies are supposed to warn us when something might be amiss—but what if the alerts themselves…

Singapore battling sophisticated cyberattack from UNC3886, minister says
19
Aug
2025

Singapore battling sophisticated cyberattack from UNC3886, minister says

Singapore is dealing with a “serious” cyberattack against its critical infrastructure by a highly sophisticated entity linked by industry experts…

Threat Actors Use Pirated Games to Bypass Microsoft Defender SmartScreen and Adblockers
19
Aug
2025

Threat Actors Use Pirated Games to Bypass Microsoft Defender SmartScreen and Adblockers

Cybersecurity researchers have uncovered a sophisticated campaign where threat actors leverage pirated game downloads to distribute HijackLoader, a modular malware…