SAP NetWeaver Vulnerability Allows Attackers to Escalate Privileges
10
Jun
2025

SAP NetWeaver Vulnerability Allows Attackers to Escalate Privileges

A critical vulnerability in the SAP NetWeaver Application Server AS ABAP has been disclosed under SAP Security Note #3600840, carrying…

FIN6 Uses AWS-Hosted Fake Resumes on LinkedIn to Deliver More_eggs Malware
10
Jun
2025

FIN6 Uses AWS-Hosted Fake Resumes on LinkedIn to Deliver More_eggs Malware

Jun 10, 2025Ravie LakshmananPhishing / Cybercrime The financially motivated threat actor known as FIN6 has been observed leveraging fake resumes…

Outlook
10
Jun
2025

Microsoft Outlook to block more risky attachments used in attacks

Microsoft announced it will expand the list of blocked attachments in Outlook Web and the new Outlook for Windows starting…

Phishing Defense Strategies - Advanced Techniques for Email Security
10
Jun
2025

Phishing Defense Strategies – Advanced Techniques for Email Security

Modern phishing attacks have evolved far beyond simple deceptive emails, now incorporating AI-generated content, deepfake impersonation, and sophisticated social engineering…

The ‘Long-Term Danger’ of Trump Sending Troops to the LA Protests
10
Jun
2025

The ‘Long-Term Danger’ of Trump Sending Troops to the LA Protests

In contrast, Rutgers University professor Bruce Afran says deploying military forces against Americans is “completely unconstitutional” in the absence of…

North Korean APT Hackers Target Users on Social Media to Spread Malware
10
Jun
2025

North Korean APT Hackers Target Users on Social Media to Spread Malware

The Genians Security Center (GSC) has uncovered a highly sophisticated Advanced Persistent Threat (APT) campaign orchestrated by the North Korean…

OpenAI Shuts Down 10 Malicious AI Ops Linked to China, Russia, Iran, N. Korea
10
Jun
2025

OpenAI Shuts Down 10 Malicious AI Ops Linked to China, Russia, Iran, N. Korea

OpenAI, a leading artificial intelligence company, has revealed it is actively fighting widespread misuse of its AI tools by malicious…

Tariff turmoil: IT procurement and the public sector
10
Jun
2025

Tariff turmoil: IT procurement and the public sector

Tariffs proposed by the US government threaten to upend trading relationships across the world, with IT procurement already feeling the…

Main distributor to Whole Foods hit by cyberattack
10
Jun
2025

Main distributor to Whole Foods hit by cyberattack

United Natural Foods, Inc. is dealing with “temporary disruptions” to its operations stemming from “unauthorized activity” involving its information technology…

Texas flag
10
Jun
2025

Texas Dept. of Transportation breached, 300k crash records stolen

The Texas Department of Transportation (TxDOT) is warning that it suffered a data breach after a threat actor downloaded 300,000…

An Open-Source Tool to See Through Encrypted Traffic in Linux systems
10
Jun
2025

An Open-Source Tool to See Through Encrypted Traffic in Linux systems

Qpoint has released Qtap, an open-source eBPF agent for monitoring network traffic in Linux systems. It hooks into TLS/SSL functions…

ISPConfig Vulnerability Allows Privilege Escalation to Superadmin and PHP Code Injection Exploit
10
Jun
2025

ISPConfig Vulnerability Allows Privilege Escalation to Superadmin and PHP Code Injection Exploit

A critical security vulnerability has been identified in ISPConfig version 3.2.12p1, a widely used open-source web hosting control panel. The…