EchoLeak Zero-Click AI Attack in Microsoft Copilot Exposes Company Data
12
Jun
2025

New ‘Zero-Click’ AI Flaw Found in Microsoft 365 Copilot, Exposing Data

Cybersecurity firm Aim Labs has uncovered a serious new security problem, named EchoLeak, affecting Microsoft 365 (M365) Copilot, a popular…

How to Address the Expanding Security Risk
12
Jun
2025

How to Address the Expanding Security Risk

Human identities management and control is pretty well done with its set of dedicated tools, frameworks, and best practices. This…

GitLab
12
Jun
2025

GitLab patches high severity account takeover, missing auth issues

GitLab has released security updates to address multiple vulnerabilities in the company’s DevSecOps platform, including ones enabling attackers to take…

Threat Actors Allegedly Selling MaaS Botnet on Hackers Forums
12
Jun
2025

Threat Actors Allegedly Selling MaaS Botnet on Hackers Forums

Threat actors are allegedly offering the complete source code of a sophisticated Malware-as-a-Service (MaaS) botnet for sale.  This advanced malicious…

Trend Micro Apex One Zero-Day Vulnerability Enables Attackers to Inject Malicious Code
12
Jun
2025

Trend Micro Apex One Zero-Day Vulnerability Enables Attackers to Inject Malicious Code

Trend Micro has issued an urgent security bulletin addressing five critical vulnerabilities in its Apex One endpoint security platform that…

Zero-Click AI Vulnerability Exposes Microsoft 365 Copilot Data Without User Interaction
12
Jun
2025

Zero-Click AI Vulnerability Exposes Microsoft 365 Copilot Data Without User Interaction

A novel attack technique named EchoLeak has been characterized as a “zero-click” artificial intelligence (AI) vulnerability that allows bad actors…

Sweden gets help pulling its sovereign AI socks up
12
Jun
2025

Sweden gets help pulling its sovereign AI socks up

Financiers picked up the pace of funding in artificial intelligence (AI) infrastructure in Sweden last month, after an urgent government…

U.S. CISA adds Google Chromium V8 flaw to its Known Exploited Vulnerabilities catalog
12
Jun
2025

SinoTrack GPS device flaws allow remote vehicle control and location tracking

SinoTrack GPS device flaws allow remote vehicle control and location tracking Pierluigi Paganini June 12, 2025 Two vulnerabilities in SinoTrack…

Trend Micro Apex One Vulnerability Allow Attackers to Inject Malicious Code
12
Jun
2025

Trend Micro Apex One Vulnerability Allow Attackers to Inject Malicious Code

Multiple critical security vulnerabilities in the Trend Micro Apex One enterprise security platform could enable attackers to inject malicious code and escalate…

Gov.uk One Login yet to meet government cyber security standards for critical public services
12
Jun
2025

MPs to investigate potential for government digital identity scheme

MPs are to investigate the risks and opportunities of digital identity in the UK, as Labour influencers increasingly call for…

Windows 11
12
Jun
2025

Windows 11 24H2 emergency update fixes Easy Anti-Cheat BSOD issue

Microsoft has released an emergency Windows 11 24H2 update to address an incompatibility issue triggering restarts with blue screen of death…

PAN-OS Vulnerability Let Attacker Run Arbitrary Commands as Root User
12
Jun
2025

PAN-OS Vulnerability Let Attacker Run Arbitrary Commands as Root User

A newly disclosed command injection vulnerability in Palo Alto Networks’ PAN-OS operating system poses significant security risks to enterprise firewall…