Google’s Android pKVM Framework Achieves SESIP Level 5 Certification
13
Aug
2025

Google’s Android pKVM Framework Achieves SESIP Level 5 Certification

Google has revealed that protected KVM (pKVM), the hypervisor that powers the Android Virtualization Framework (AVF), has achieved SESIP Level…

Fortinet FortiWeb flaw CVE-2025-25257 exploited hours after PoC release
13
Aug
2025

Critical FortiSIEM flaw under active exploitation, Fortinet warns

Critical FortiSIEM flaw under active exploitation, Fortinet warns Pierluigi Paganini August 13, 2025 Fortinet warns of a critical FortiSIEM vulnerability,…

Black Hat USA 2025 – AI, Innovation, and the Power of the Cybersecurity Community
13
Aug
2025

Black Hat USA 2025 – AI, Innovation, and the Power of the Cybersecurity Community

By Gary Miliefsky, Publisher of Cyber Defense Magazine Black Hat, the cybersecurity industry’s most established and in-depth security event series,…

Data Brokers Face New Pressure for Hiding Opt-Out Pages From Google
13
Aug
2025

Data Brokers Face New Pressure for Hiding Opt-Out Pages From Google

United States senator Maggie Hassan is pressing major data brokers after an investigation by The Markup/CalMatters and copublished by WIRED…

Efimer Trojan Steals Crypto, Hacks WordPress Sites via Torrents and Phishing
13
Aug
2025

Efimer Trojan Steals Crypto, Hacks WordPress Sites via Torrents and Phishing

Kaspersky reports Efimer Trojan infecting thousands, swapping crypto wallets, brute-forcing sites, and spreading through torrents and phishing. Cybercriminals are getting…

FortiSIEM Vulnerabiliti, Fortinet, CVE-2025-25256
13
Aug
2025

Fortinet Issues Emergency Patch For Actively Exploited Critical FortiSIEM Bug

Fortinet has urgently notified users of a critical OS command injection vulnerability in its FortiSIEM platform, identified as CVE-2025-25256, which…

How the always-on generation can level up their cybersecurity game
13
Aug
2025

How the always-on generation can level up their cybersecurity game

Digital natives are comfortable with technology, but may be more exposed to online scams and other threats than they think…

Microsoft Office Vulnerabilities Let Attackers Execute Remote Code
13
Aug
2025

Microsoft Office Vulnerabilities Let Attackers Execute Remote Code

Microsoft released critical security updates, addressing three serious vulnerabilities in Microsoft Office that could allow attackers to execute remote code…

Adobe’s August 2025 Patch Tuesday Fixes 60 Vulnerabilities Across Multiple Products
13
Aug
2025

Adobe’s August 2025 Patch Tuesday Fixes 60 Vulnerabilities Across Multiple Products

Adobe has rolled out its August 2025 Patch Tuesday updates, addressing a total of 60 vulnerabilities across a wide array…

New PS1Bot Malware Campaign Uses Malvertising to Deploy Multi-Stage In-Memory Attacks
13
Aug
2025

New PS1Bot Malware Campaign Uses Malvertising to Deploy Multi-Stage In-Memory Attacks

Aug 13, 2025Ravie LakshmananMalvertising / Cryptocurrency Cybersecurity researchers have discovered a new malvertising campaign that’s designed to infect victims with…

Xerox patches critical vulnerability in FreeFlow Core application
13
Aug
2025

Xerox patches critical vulnerability in FreeFlow Core application

Xerox has issued a security upgrade for critical and high-severity vulnerabilities in its FreeFlow Core product that researchers said could…

Check your risk blind spot
13
Aug
2025

Check your risk blind spot

Does your business truly understand its dependencies, and how to mitigate the risks posed by an attack on them? 12…