ATSE Welcomes Coalition Shadow Ministry Appointments
30
May
2025

ATSE Welcomes Coalition Shadow Ministry Appointments

The Australian Academy of Technological Sciences and Engineering (ATSE) welcomed Melissa Price’s appointment as shadow minister for cybersecurity and the…

Sprocket header image
30
May
2025

Attackers are mapping your attack surface—are you?

Today’s threat landscape, attack surfaces are expanding faster than most security teams can track. Every new cloud asset, exposed API,…

AI Security for Low/No-Code and Vibe Coded Applications
30
May
2025

AI Security for Low/No-Code and Vibe Coded Applications

Companies want results fast, and low/no-code (LCNC) and Vibe Coding platforms promise just that: rapid application development with either no…

Pure Crypter Uses Multiple Evasion Methods to Bypass Windows 11 24H2 Security Features
30
May
2025

Pure Crypter Uses Multiple Evasion Methods to Bypass Windows 11 24H2 Security Features

Pure Crypter, a well-known malware-as-a-service (MaaS) loader, has been recognized as a crucial tool for threat actors targeting Windows-based systems…

Threat Actor Claims TikTok Breach, Puts 428 Million Records Up for Sale
30
May
2025

Threat Actor Claims TikTok Breach, Puts 428 Million Records Up for Sale

A newly emerged threat actor, going by the alias “Often9,” has posted on a prominent cybercrime and database trading forum,…

The Global Cybercrime Industry As A Country
30
May
2025

The Global Cybercrime Industry As A Country

To understand the magnitude of the modern cybersecurity threat, it’s instructive to think of the global cybercrime industry as a…

Using AI to outsmart AI-driven phishing scams
30
May
2025

Using AI to outsmart AI-driven phishing scams

Phishing scams used to be filled with awkward wording and obvious grammar mistakes. Not anymore. AI is now making it…

China-Linked Hackers Exploit SAP and SQL Server Flaws in Attacks Across Asia and Brazil
30
May
2025

China-Linked Hackers Exploit SAP and SQL Server Flaws in Attacks Across Asia and Brazil

May 30, 2025Ravie LakshmananVulnerability / Threat Intelligence The China-linked threat actor behind the recent in-the-wild exploitation of a critical security…

How cyber security professionals are leveraging AWS tools
30
May
2025

How cyber security professionals are leveraging AWS tools

With millions of businesses now using Amazon Web Services (AWS) for their cloud computing needs, it’s become a vital consideration…

CVE-2025-27522
30
May
2025

Apache InLong CVE-2025-27522 Exposes RCE Attacks

A newly disclosed vulnerability, tracked as CVE-2025-27522, has been discovered in Apache InLong, a widely used real-time data streaming platform….

China hackers
30
May
2025

Chinese Hacking Group APT41 Exploits Google Calendar to Target Governments

Chinese state-sponsored threat actor APT41 has targeted government entities with malware that uses Google Calendar for command-and-control (C&C), Google warns….

US Treasury sanctioned the firm Funnull Technology as major cyber scam facilitator
30
May
2025

US Treasury sanctioned the firm Funnull Technology as major cyber scam facilitator

US Treasury sanctioned the firm Funnull Technology as major cyber scam facilitator Pierluigi Paganini May 30, 2025 The U.S. sanctioned…