Xerox FreeFlow Vulnerabilities leads to SSRF and RCE Attacks
11
Aug
2025

Xerox FreeFlow Vulnerabilities leads to SSRF and RCE Attacks

An urgent security update has been released for Xerox FreeFlow Core software, addressing two critical vulnerabilities that could allow attackers…

Inside the Multimillion-Dollar Gray Market for Video Game Cheats
11
Aug
2025

Inside the Multimillion-Dollar Gray Market for Video Game Cheats

It’s all part of the ongoing tussle between the cheat developers and games companies, which spend money on developing anti-cheat…

Multiple Critical Flaws Hit Zero Trust Products from Check Point, Zscaler, and Netskope
11
Aug
2025

Multiple Critical Flaws Hit Zero Trust Products from Check Point, Zscaler, and Netskope

Security researchers at AmberWolf have uncovered critical vulnerabilities in leading Zero Trust Network Access (ZTNA) solutions from major cybersecurity vendors,…

WinRAR zero day exploited by RomCom hackers in targeted attacks
11
Aug
2025

WinRAR zero day exploited by RomCom hackers in targeted attacks

ESET researchers have discovered a previously unknown vulnerability in WinRAR, exploited in the wild by Russia-aligned group RomCom. If you…

Smart Buses flaws expose vehicles to tracking, control, and spying
11
Aug
2025

Smart Buses flaws expose vehicles to tracking, control, and spying

Smart Buses flaws expose vehicles to tracking, control, and spying Pierluigi Paganini August 11, 2025 Researchers showed how hackers can…

Microsoft Exchange
11
Aug
2025

Over 29,000 Exchange servers unpatched against high-severity flaw

Over 29,000 Exchange servers exposed online remain unpatched against a high-severity vulnerability that can let attackers move laterally in Microsoft…

APT Sidewinder Spoofs Government and Military Institutions to Steal Login Credentials
11
Aug
2025

APT Sidewinder Spoofs Government and Military Institutions to Steal Login Credentials

APT Sidewinder, a persistent threat actor believed to originate from South Asia, has launched a sophisticated credential harvesting campaign targeting…

Malware Campaign Masquerades as Tesla in Poisoned Google Ads
11
Aug
2025

Malware Campaign Masquerades as Tesla in Poisoned Google Ads

A malware operation has surfaced in the context of a complex cyber threat landscape, using tainted Google Ads to pose…

Report Reveals Tool Overload Driving Fatigue and Missed Threats in MSPs
11
Aug
2025

Report Reveals Tool Overload Driving Fatigue and Missed Threats in MSPs

London, United Kingdom, August 11th, 2025, CyberNewsWire New Heimdal study reveals how tool sprawl creates blind spots, with over half…

New Open Source Tool to Exploit Vulnerabilities in SSH Protocol
11
Aug
2025

New Open Source Tool to Exploit Vulnerabilities in SSH Protocol

SSHAmble is a powerful open-source reconnaissance tool designed to identify and exploit vulnerabilities in SSH implementations across internet-facing systems.  Presented…

Windows RPC Protocol Exploited to Launch Server Spoofing Attacks
11
Aug
2025

Windows RPC Protocol Exploited to Launch Server Spoofing Attacks

A vulnerability in Microsoft Windows’ Remote Procedure Call (RPC) protocol has been discovered that allows attackers to manipulate core system…

Will CDPs deliver on the marketing promise of personalisation?
11
Aug
2025

Will CDPs deliver on the marketing promise of personalisation?

Businesses have long chased the promise of a single customer view. As far back as 1999, a group of suppliers,…