The hidden security risks of open source AI
02
Jun
2025

The hidden security risks of open source AI

Open source AI is gaining momentum across major players. DeepSeek recently announced plans to share parts of its model architecture…

Telstra launches satellite messaging service
02
Jun
2025

Telstra launches satellite messaging service

Telstra has commercially launched Starlink-backed satellite-to-mobile messaging just weeks after live trials, albeit initially only for Samsung Galaxy S25 series…

Vulnerabilities in Preinstalled Android Apps Expose PIN Codes and Allow Command Injection
02
Jun
2025

Vulnerabilities in Preinstalled Android Apps Expose PIN Codes and Allow Command Injection

Significant vulnerabilities were uncovered in pre-installed applications on Ulefone and Krüger&Matz Android smartphones that expose users to significant risks, including…

Threat Actors Leverage ClickFix Technique to Deploy EddieStealer Malware
02
Jun
2025

Threat Actors Leverage ClickFix Technique to Deploy EddieStealer Malware

Cybersecurity researchers have identified a sophisticated malware campaign utilizing deceptive CAPTCHA interfaces to distribute EddieStealer, a Rust-based information stealing malware…

How to Keep Your Litecoin Safe: A Practical Guide
02
Jun
2025

How to Keep Your Litecoin Safe: A Practical Guide

Litecoin (LTC), often called the “silver to Bitcoin’s gold,” has long been popular for its speed, lower transaction fees, and…

DSPM vs. DLP : Understanding the Key Differences
02
Jun
2025

DSPM vs. DLP : Understanding the Key Differences

Modern organizations face a growing challenge in protecting sensitive data. As more people adopt the cloud and rules get tougher,…

Stealth Syscall Technique Allows Hackers to Evade Event Tracing and EDR Detection
02
Jun
2025

Stealth Syscall Technique Allows Hackers to Evade Event Tracing and EDR Detection

Advanced threat actors have developed sophisticated stealth syscall execution techniques that successfully bypass modern security infrastructure, including Event Tracing for…

Linux Crash Reporting Flaws (CVE-2025-5054, 4598) Expose Password Hashes
02
Jun
2025

Linux Crash Reporting Flaws (CVE-2025-5054, 4598) Expose Password Hashes

Qualys details CVE-2025-5054 and CVE-2025-4598, critical vulnerabilities affecting Linux crash reporting tools like Apport and systemd-coredump. Learn how to protect…

SentinelOne
02
Jun
2025

Last week’s 7-hour outage caused by software flaw

American cybersecurity company SentinelOne revealed over the weekend that a software flaw triggered a seven-hour-long outage on Thursday. This massive…

Qualcomm Adreno GPU 0-Day Vulnerabilities Exploited to Attack Android Users
02
Jun
2025

Qualcomm Adreno GPU 0-Day Vulnerabilities Exploited to Attack Android Users

Mobile chipmaker Qualcomm has issued urgent security patches for three critical zero-day vulnerabilities in its Adreno GPU drivers that are…

Over 50,000 Azure AD Users' Access Tokens Exposed via Unauthenticated API Endpoint
02
Jun
2025

Over 50,000 Azure AD Users’ Access Tokens Exposed via Unauthenticated API Endpoint

CloudSEK’s BeVigil platform has uncovered a critical security vulnerability affecting an aviation giant, where an exposed JavaScript file containing an…

02
Jun
2025

Hive Five 226 – Mastery vs. Management

I took my laptop on the road and outside several times this week while it was sunny, and it made…