Criminal IP Set to Make Its Debut at Infosecurity Europe 2025
30
May
2025

Criminal IP Set to Make Its Debut at Infosecurity Europe 2025

Criminal IP, the AI-powered threat intelligence platform developed by AI SPERA (led by CEO Byungtak Kang), has announced its first…

Thousands of ASUS routers compromised in sophisticated hacking campaign
30
May
2025

Thousands of ASUS routers compromised in sophisticated hacking campaign

More than 9,000 ASUS routers have been compromised in a months-long hacking campaign that researchers from GreyNoise warn may be…

Scammer
30
May
2025

US sanctions firm linked to cyber scams behind $200 million in losses

The U.S. Treasury Department has sanctioned Funnull Technology, a Philippines-based company that supports hundreds of thousands of malicious websites behind…

Apache InLong JDBC Vulnerability Enables Deserialization of Untrusted Data
30
May
2025

Apache InLong JDBC Vulnerability Enables Deserialization of Untrusted Data

A moderate-severity vulnerability, tracked as CVE-2025-27522, has been disclosed in Apache InLong, a popular data integration platform. The flaw, affecting…

Victoria's Secret pulls down website amid security incident
30
May
2025

Victoria’s Secret pulls down website amid security incident

Clothing and lingerie retailer Victoria’s Secret suspended most of the functionality of its website and some in-store services to “address…

ASUS Router Vulnerability
30
May
2025

GreyNoise Flags 9,000 ASUS Routers Backdoored Via Patched Vulnerability

Threat intelligence firm GreyNoise on Wednesday lifted the lid on a stealth malware campaign that has quietly converted thousands of…

Google: China-backed hackers hiding malware in calendar events
30
May
2025

Google: China-backed hackers hiding malware in calendar events

Listen to the article 3 min This audio is auto-generated. Please let us know if you have feedback. Dive Brief:…

Apple Safari exposes users to fullscreen browser-in-the-middle attacks
30
May
2025

Apple Safari exposes users to fullscreen browser-in-the-middle attacks

A weakness in Apple’s Safari web browser allows threat actors to leverage the fullscreen browser-in-the-middle (BitM) technique to steal account credentials from…

Interlock Ransomware Uses NodeSnake RAT for Persistent Access to Corporate Networks
30
May
2025

Interlock Ransomware Uses NodeSnake RAT for Persistent Access to Corporate Networks

In a two UK-based universities have fallen victim to a sophisticated Remote Access Trojan (RAT) dubbed NodeSnake within the past…

CEOs and IT chiefs missaligned on AI readiness
30
May
2025

CEOs and IT chiefs missaligned on AI readiness

There appears to be a massive gap between expectations from business chiefs as to their organisations’ artificial intelligence (AI) readiness…

Northcott to explore AI summarisation
30
May
2025

Northcott to explore AI summarisation

Northcott is looking to use AI to summarise information in customer files and to improve accessibility and support for both…

Unbound Raises $4 Million to Secure Gen-AI Adoption
30
May
2025

Unbound Raises $4 Million to Secure Gen-AI Adoption

Unbound, a cybersecurity startup working on technology to enable organizations to securely and responsibly adopt generative-AI tools across their environments,…