IBM reorients storage to cloud, containers and as-a-service
10
Jun
2025

IBM reorients storage to cloud, containers and as-a-service

In this storage supplier profile, we look at IBM, which has perhaps the longest history of all the storage players,…

U.S. CISA adds Google Chromium V8 flaw to its Known Exploited Vulnerabilities catalog
10
Jun
2025

U.S. CISA adds RoundCube Webmail and Erlang Erlang/OTP SSH server flaws to its Known Exploited Vulnerabilities catalog

U.S. CISA adds RoundCube Webmail and Erlang Erlang/OTP SSH server flaws to its Known Exploited Vulnerabilities catalog Pierluigi Paganini June 10,…

OpenAI
10
Jun
2025

OpenAI working to fix ChatGPT outage affecting users worldwide

OpenAI is working to fix an ongoing outage impacting ChatGPT users worldwide and preventing them from accessing the chatbot on…

Airlines Don’t Want You to Know They Sold Your Flight Data to DHS
10
Jun
2025

Airlines Don’t Want You to Know They Sold Your Flight Data to DHS

A data broker owned by the country’s major airlines, including Delta, American Airlines, and United, collected US travelers’ domestic flight…

Hackers Persist in Using ConnectWise ScreenConnect Tool to Distribute Malware
10
Jun
2025

Hackers Persist in Using ConnectWise ScreenConnect Tool to Distribute Malware

Hackers continue to exploit the ConnectWise ScreenConnect remote management and monitoring (RMM) tool to deploy malicious payloads, with a focus…

Webinar: Cloud security made easy with CIS Hardened Images
10
Jun
2025

Webinar: Cloud security made easy with CIS Hardened Images

This webinar is designed for leadership and management professionals looking to enhance their organization’s security posture in the cloud. The…

44% of people encounter a mobile scam every single day, Malwarebytes finds
10
Jun
2025

44% of people encounter a mobile scam every single day, Malwarebytes finds

It’s become so troublesome owning a phone. Malicious texts pose as package delivery notifications, phishing emails impersonate trusted brands, and…

Critical Vulnerability in Lovable's Security Policies Allows Malicious Code Injection
10
Jun
2025

Critical Vulnerability in Lovable’s Security Policies Allows Malicious Code Injection

Security researchers have uncovered a widespread vulnerability in Lovable’s AI-powered development platform that exposes sensitive user data and enables malicious…

Software QA Teams Prevent Cyber Disasters By Finding Vulnerabilities Before Hackers Do
10
Jun
2025

Stop tricking employees. Start training them.

CyberHoot helps businesses of all sizes, from scrappy startups to global enterprises, automate security awareness training for its employees using a…

Non-Human Identity Management
10
Jun
2025

Why Non-Human Identity Management is the Next Cybersecurity Frontier

Modern enterprise networks are highly complex environments that rely on hundreds of apps and infrastructure services. These systems need to…

Cryptocurrency
10
Jun
2025

Five plead guilty to laundering $36 million stolen in investment scams

Five men from China, the United States, and Turkey pleaded guilty to their involvement in an international crime ring and…

Indian Authorities Bust Cybercriminals Posing as Microsoft Tech Support
10
Jun
2025

Indian Authorities Bust Cybercriminals Posing as Microsoft Tech Support

India’s Central Bureau of Investigation (CBI), the nation’s federal law enforcement agency, launched a sweeping operation targeting cyber-enabled financial fraud…