Louis Vuitton Hong Kong faces probe for data breach affecting 419,000 customers
19
Aug
2025

Louis Vuitton Hong Kong faces probe for data breach affecting 419,000 customers

The privacy watchdog has launched an investigation after Louis Vuitton Hong Kong suffered a data breach that compromised the personal…

Why did Singapore name cyberthreat group UNC3886 and is it linked to China?
18
Aug
2025

Why did Singapore name cyberthreat group UNC3886 and is it linked to China?

Singapore has made a rare move to identify the UNC3886 cyberthreat group that it says is attacking local critical infrastructure….

Blue Locker Ransomware Launches Targeted Attacks on the Oil and Gas Sector in Pakistan
18
Aug
2025

Blue Locker Ransomware Launches Targeted Attacks on the Oil and Gas Sector in Pakistan

Pakistan’s National Cyber Emergency Response Team (NCERT) has issued a high-alert advisory to 39 key ministries and institutions, warning of…

Noodlophile Malware Campaign Expands Global Reach with Copyright Phishing Lures
18
Aug
2025

Noodlophile Malware Campaign Expands Global Reach with Copyright Phishing Lures

Aug 18, 2025Ravie LakshmananMalware / Enterprise Security The threat actors behind the Noodlophile malware are leveraging spear-phishing emails and updated…

New HTTP/2 DoS Vulnerability Prompts Vendor and Project Fixes
18
Aug
2025

New HTTP/2 DoS Vulnerability Prompts Vendor and Project Fixes

A new HTTP/2 denial of service (DoS) vulnerability that circumvents mitigations put in place after 2023’s “Rapid Reset” vulnerability is…

Commuters on Malaysia’s Rapid KL rail. Malaysians are wary of downloading MyDigital ID because of recent security breaches. Photo: Shutterstock
18
Aug
2025

Malaysia mulls making digital ID mandatory as security fears hinder adoption

Fewer than one in every 10 eligible Malaysians has signed up for a digital identity card in a flat rejection…

Building Trust in Your Workflows
18
Aug
2025

Building Trust in Your Workflows

AI for Cybersecurity: Building Trust in Your Workflows Pierluigi Paganini August 18, 2025 In cybersecurity, speed matters, but trust is…

18
Aug
2025

The Third Limitation to Creativity

The moment when you realize what was previously impossible is now trivial I just wrote a new piece about the…

Chinese hacking groups are behind SharePoint attacks, Microsoft says
18
Aug
2025

Chinese hacking groups are behind SharePoint attacks, Microsoft says

Microsoft accused Chinese state-sponsored hackers of using flaws in its SharePoint document management software in a hacking campaign that has…

ERMAC Android malware source code leak exposes banking trojan infrastructure
18
Aug
2025

ERMAC Android malware source code leak exposes banking trojan infrastructure

The source code for version 3 of the ERMAC Android banking trojan has been leaked online, exposing the internals of the malware-as-a-service platform…

Threat Actors Exploit Microsoft Help Index File to Deploy PipeMagic Malware
18
Aug
2025

Threat Actors Exploit Microsoft Help Index File to Deploy PipeMagic Malware

Cybersecurity researchers have uncovered a sophisticated campaign where threat actors leverage a Microsoft Help Index File (.mshi) to deploy the…

Fake ChatGPT Desktop App Delivering PipeMagic Backdoor, Microsoft
18
Aug
2025

Fake ChatGPT Desktop App Delivering PipeMagic Backdoor, Microsoft

Microsoft warns that a fake ChatGPT desktop app was used to deliver PipeMagic malware, linked to ransomware attacks exploiting a…