Microsoft Office Vulnerabilities Let Attackers Execute Remote Code
11
Jun
2025

Microsoft Office Vulnerabilities Let Attackers Execute Remote Code

Multiple critical vulnerabilities in Microsoft Office could allow attackers to execute arbitrary code on affected systems.  The vulnerabilities, tracked as…

How To Strengthen the Security of Your Symfony-Based Solution
11
Jun
2025

How To Strengthen the Security of Your Symfony-Based Solution

Like all web-based solutions, applications built with Symfony are exposed to various cyber threats, and you should be ready to…

Over 40,000 Internet-Connected Cameras Exposed, Streaming Live Online
11
Jun
2025

Over 40,000 Internet-Connected Cameras Exposed, Streaming Live Online

Bitsight TRACE has uncovered more than 40,000 security cameras openly accessible on the internet—streaming live footage from homes, offices, factories,…

Windows Common Log File System Driver Vulnerability Let Attackers Escalate Privileges
11
Jun
2025

Windows Common Log File System Driver Vulnerability Let Attackers Escalate Privileges

A critical security vulnerability in the Windows Common Log File System Driver (CLFS) enables attackers to escalate their privileges to…

Interpol Dismantles 20,000 Malicious IPs and Domains Tied to 69 Malware Variants
11
Jun
2025

Interpol Dismantles 20,000 Malicious IPs and Domains Tied to 69 Malware Variants

INTERPOL’s Operation Secure has seen the takedown of more than 20,000 malicious IP addresses and domains associated with infostealer malware….

Authorities seized 41 servers during Operation Secure.
11
Jun
2025

Global law enforcement action in Asia nets large infrastructure seizure, 32 arrests

Authorities from 26 countries scored another win in the global crackdown on cybercrime earlier this year, chipping away at multiple…

Linux Malware Authors Attacking Cloud Environments Using ELF Binaries
11
Jun
2025

Linux Malware Authors Attacking Cloud Environments Using ELF Binaries

A sophisticated wave of Linux malware campaigns is targeting cloud environments with increasing frequency and complexity, posing significant threats to…

How to Use Risk Management to Strengthen Business Cybersecurity
11
Jun
2025

How to Use Risk Management to Strengthen Business Cybersecurity

Cybersecurity is a massive point of emphasis for most businesses in the modern age. You must work diligently to protect…

How Waymo Handles Footage From Events Like the LA Immigration Protests
11
Jun
2025

How Waymo Handles Footage From Events Like the LA Immigration Protests

Waymo declined to answer questions from WIRED about how many cameras are inside its vehicles, exactly how long footage is…

ConnectWise to Update Code Signing Certificates for ScreenConnect, Automate, and RMM
11
Jun
2025

ConnectWise to Update Code Signing Certificates for ScreenConnect, Automate, and RMM

ConnectWise, a leading provider of remote management and cyber protection tools for managed service providers (MSPs), is set to implement…

23andMe logo
11
Jun
2025

23andMe raked by Congress on privacy, sale of genetic data

In a Senate hearing adequately titled “23 and You: The Privacy and National Security Implications of the 23andMe Bankruptcy,” 23andMe…

FIN6 Hackers Mimic as Job Seekers to Target Recruiters with Weaponized Resumes
11
Jun
2025

FIN6 Hackers Mimic as Job Seekers to Target Recruiters with Weaponized Resumes

A sophisticated cybercrime campaign has emerged where threat actors are exploiting the trust inherent in professional recruitment processes, transforming routine…