What we know about the cybercrime group Scattered Spider
30
Jul
2025

What we know about the cybercrime group Scattered Spider

Scattered Spider, also known as Muddled Libra, Octo Tempest, Scatter Swine and UNC3944, is a group of cybercriminals who specialize…

Apple
30
Jul
2025

Apple patches security flaw exploited in Chrome zero-day attacks

Apple has released security updates to address a high-severity vulnerability that has been exploited in zero-day attacks targeting Google Chrome…

Threat Actors Allegedly Claim Access to Nokia’s Internal Network
30
Jul
2025

Threat Actors Allegedly Claim Access to Nokia’s Internal Network

A threat actor, Tsar0Byte, allegedly claimed to have breached the company’s internal network through a vulnerable third-party link, exposing sensitive…

Qilin Ransomware Uses TPwSav.sys Driver to Bypass EDR Security Measures
30
Jul
2025

Qilin Ransomware Uses TPwSav.sys Driver to Bypass EDR Security Measures

Cybercriminals affiliated with the Qilin ransomware-as-a-service (RaaS) operation have demonstrated advanced evasion techniques by exploiting a previously undocumented vulnerable driver,…

Apple pushes almost 30 security fixes in mobile update
30
Jul
2025

Apple pushes almost 30 security fixes in mobile update

Apple has released more than 20 vulnerability fixes for its mobile device ecosystem in a new round of updates to…

Palo Alto Networks to Acquire CyberArk in $25 Billion Deal
30
Jul
2025

Palo Alto Networks to Acquire CyberArk in $25 Billion Deal

Palo Alto Networks, a leader in cybersecurity, announced today that it has agreed to buy CyberArk, a company known for…

Threat Actors Use LNK Files to Deploy RedLoader Malware on Windows Systems
30
Jul
2025

Threat Actors Use LNK Files to Deploy RedLoader Malware on Windows Systems

Sophos analysts have identified a novel infection chain employed by the financially motivated cybercriminal group GOLD BLADE, also known as…

MS Authenticator users face passkey crunch time
30
Jul
2025

MS Authenticator users face passkey crunch time

Microsoft’s move towards passwordless technology will kick up a gear from Friday 1 August 2025, when Redmond will implement new…

CISA’s Joint Cyber Defense Collaborative takes major personnel hit
30
Jul
2025

CISA’s Joint Cyber Defense Collaborative takes major personnel hit

Listen to the article 5 min This audio is auto-generated. Please let us know if you have feedback. The Cybersecurity…

Greg Otto
30
Jul
2025

Palo Alto Networks to acquire CyberArk for $25 billion

Palo Alto Networks has agreed to acquire identity security firm CyberArk for approximately $25 billion, marking the cybersecurity giant’s largest…

Lenovo
30
Jul
2025

New Lenovo UEFI firmware updates fix Secure Boot bypass flaws

Lenovo is warning of high-severity BIOS flaws that could let attackers bypass Secure Boot on all-in-one desktops using customized Insyde…

Threat Actors Weaponize LNK Files With New REMCOS Variant That Bypasses AV Engines
30
Jul
2025

Threat Actors Weaponize LNK Files With New REMCOS Variant That Bypasses AV Engines

Cybercriminals are increasingly leveraging malicious Windows Shortcut (LNK) files to deploy sophisticated backdoors, with a new campaign delivering an advanced…