Washington Post investigating cyberattack on journalists' email accounts
17
Jun
2025

Washington Post investigating cyberattack on journalists’ email accounts

The Washington Post is investigating a cyberattack on email accounts of some of its journalists, according to a source familiar…

Kelly Benefits December data breach impacted over 400,000 individuals
17
Jun
2025

India-based car-sharing company Zoomcar suffered a data breach impacting 8.4M users

India-based car-sharing company Zoomcar suffered a data breach impacting 8.4M users Pierluigi Paganini June 17, 2025 Zoomcar disclosed a data…

Threat Actors Abuse Windows Run Prompt to Execute Malicious Command and Deploy DeerStealer
17
Jun
2025

Threat Actors Abuse Windows Run Prompt to Execute Malicious Command and Deploy DeerStealer

Cybersecurity researchers have uncovered a sophisticated malware campaign that exploits Windows’ built-in Run prompt to deliver DeerStealer, a powerful information…

iOS Zero Click Flaw Actively Exploited
17
Jun
2025

iOS Zero Click Flaw Actively Exploited

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a high-priority alert following the discovery and active exploitation of…

CURBy: A quantum random number generator you can verify
17
Jun
2025

CURBy: A quantum random number generator you can verify

NIST and the University of Colorado Boulder have created a public service that delivers random numbers using quantum mechanics. Called…

NSW rolls out bodycams to Safe Work inspectors
17
Jun
2025

NSW rolls out bodycams to Safe Work inspectors

The NSW government is to start rolling out body-worn video (BWV) cameras for SafeWork inspectors carrying out workplace investigations. The…

GCHQ Intern Sentenced to 7 Years for Illegally Copying Secret Files to Smartphone
17
Jun
2025

GCHQ Intern Sentenced to 7 Years for Illegally Copying Secret Files to Smartphone

A former intern at the UK’s intelligence agency GCHQ has been sentenced to seven and a half years in prison…

Hackers love events. Why aren't more CISOs paying attention?
17
Jun
2025

Hackers love events. Why aren’t more CISOs paying attention?

When CISOs think about risk, they usually think about cloud platforms, laptops, and data centers. But live events like conferences,…

ASIC inquiry to tackle ASX tech
17
Jun
2025

ASIC inquiry to tackle ASX tech “incidents”

Five key technology system “incidents” at the Australian Securities Exchange (ASX) in the past decade has prompted a fresh inquiry…

Apache Tomcat Vulnerabilities Let Attackers Bypass Authentication & Trigger DoS Attacks
17
Jun
2025

Apache Tomcat Vulnerabilities Let Attackers Bypass Authentication & Trigger DoS Attacks

Multiple critical security vulnerabilities affecting Apache Tomcat web servers, including two high-severity flaws enabling denial-of-service (DoS) attacks and one moderate-severity…

Top 5 AI SOC Analyst Platforms to Watch out for in 2025
17
Jun
2025

Top 5 AI SOC Analyst Platforms to Watch out for in 2025

As threats evolve in sophistication and frequency while cyber skills gaps persist, Security Operations Centres (SOCs) are increasingly turning to…

Apache Tomcat Flaws Allow Auth Bypass and DoS Attacks
17
Jun
2025

Apache Tomcat Flaws Allow Auth Bypass and DoS Attacks

The Apache Software Foundation has released critical security updates to address four newly discovered vulnerabilities in Apache Tomcat, one of…