Australian scaleup to bring AI-led data protection to the MoD
06
Aug
2025

Australian scaleup to bring AI-led data protection to the MoD

The UK’s Ministry of Defence (MoD) has selected Australian cyber scaleup Castlepoint Systems to run its data environment and prevent…

August 2025 Android Security Bulletin: Key Fixes Released
06
Aug
2025

August 2025 Android Security Bulletin: Key Fixes Released

Google has released its latest Android Security Bulletin for August 2025, addressing multiple vulnerabilities across the Android ecosystem. Among the…

Threat Actors Weaponizing RMM Tools to Take Control of The Machine and Steal Data
06
Aug
2025

Threat Actors Weaponizing RMM Tools to Take Control of The Machine and Steal Data

Cybercriminals are increasingly exploiting Remote Monitoring and Management (RMM) software to gain unauthorized access to corporate systems, with a sophisticated…

Trend Micro Apex One Hit by Actively Exploited RCE Vulnerability
06
Aug
2025

Trend Micro Apex One Hit by Actively Exploited RCE Vulnerability

Trend Micro has issued an urgent security bulletin warning customers of critical remote code execution vulnerabilities in its Apex One…

Critical Trend Micro Apex One Management RCE Vulnerability Actively Exploited in the wild
06
Aug
2025

Critical Trend Micro Apex One Management RCE Vulnerability Actively Exploited in the wild

Critical command injection remote code execution (RCE) vulnerabilities in Trend Micro Apex One Management Console are currently being actively exploited…

CISA Alerts on Ongoing Exploits Targeting D-Link Device Vulnerabilities
06
Aug
2025

CISA Alerts on Ongoing Exploits Targeting D-Link Device Vulnerabilities

The Cybersecurity and Infrastructure Security Agency (CISA) has escalated its campaign to protect U.S. networks by adding three newly exploited…

Qualcomm fixed three zero-days exploited in limited, targeted attacks
06
Aug
2025

Google fixed two Qualcomm bugs that were actively exploited in the wild

Google fixed two Qualcomm bugs that were actively exploited in the wild Pierluigi Paganini August 06, 2025 Google addressed multiple…

Threat Actors Weaponizing RMM Tools to Gain System Control and Exfiltrate Data
06
Aug
2025

Threat Actors Weaponizing RMM Tools to Gain System Control and Exfiltrate Data

Adversaries are using Remote Monitoring and Management (RMM) tools more frequently as dual-purpose weapons for initial access and persistence in…

D-Link Vulnerabilities
06
Aug
2025

CISA Adds 3 D-Link Vulnerabilities to KEV Catalog Amid Active Exploitation Evidence

Aug 06, 2025Ravie LakshmananVulnerability / Firmware Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added three old…

Google’s Big Sleep AI Tool Finds 20 Open-Source Bugs
06
Aug
2025

Google’s Big Sleep AI Tool Finds 20 Open-Source Bugs

An experimental AI tool developed by Google has identified its first set of real-world security vulnerabilities in widely used open-source…

U.S. CISA adds D-Link cameras and Network Video Recorder flaws to its Known Exploited Vulnerabilities catalog
06
Aug
2025

U.S. CISA adds D-Link cameras and Network Video Recorder flaws to its Known Exploited Vulnerabilities catalog

U.S. CISA adds D-Link cameras and Network Video Recorder flaws to its Known Exploited Vulnerabilities catalog Pierluigi Paganini August 06,…

CISA Releases Two Advisories Covering Vulnerabilities, and Exploits Surrounding ICS
06
Aug
2025

CISA Releases Two Advisories Covering Vulnerabilities, and Exploits Surrounding ICS

CISA released two urgent Industrial Control Systems (ICS) advisories on August 5, 2025, addressing significant security vulnerabilities in critical manufacturing…