Threat Actors Weaponize Fake AI-Themed Websites to Deliver Python-based infostealers
29
May
2025

Threat Actors Weaponize Fake AI-Themed Websites to Deliver Python-based infostealers

Mandiant Threat Defense has uncovered a malicious campaign orchestrated by the threat group UNC6032, which capitalizes on the global fascination…

City of Sydney's HR uplift to help career management
29
May
2025

City of Sydney’s HR uplift to help career management

The City of Sydney’s has “reinvigorated” its SAP SuccessFactors deployment, helping it drive a more personalised approach to its staff…

Zscaler Expands AI-Driven Security Operations with Red Canary Acquisition
29
May
2025

Zscaler Expands AI-Driven Security Operations with Red Canary Acquisition

Zscaler Inc. announced on May 27, 2025, a definitive agreement to acquire Red Canary, a leading Managed Detection and Response…

XenServer Windows VM Tools Flaw Enables Attackers to Run Arbitrary Code
29
May
2025

XenServer Windows VM Tools Flaw Enables Attackers to Run Arbitrary Code

Citrix has issued a high-severity security bulletin addressing multiple vulnerabilities—CVE-2025-27462, CVE-2025-27463, and CVE-2025-27464—affecting XenServer VM Tools for Windows. These vulnerabilities…

Azure
29
May
2025

Microsoft Entra Design Lets Guest Users Gain Azure Control, Researchers Say

Cybersecurity researchers at BeyondTrust are warning about a little-known but dangerous issue within Microsoft’s Entra identity platform. The issue isn’t…

Westpac pilots AI to analyse inbound call content
28
May
2025

Westpac pilots AI to analyse inbound call content

Westpac is piloting AI to help its scam and fraud support team process and analyse the information a customer is…

CFOs, financial execs in crosshairs of ‘highly targeted’ spearphishing campaign
28
May
2025

CFOs, financial execs in crosshairs of ‘highly targeted’ spearphishing campaign

Dive Brief: A “highly targeted” spearphishing campaign is attempting to ensnare financial executives at banks, investment firms, energy utilities and…

Mandiant flags fake AI video generators laced with malware
28
May
2025

Mandiant flags fake AI video generators laced with malware

As the internet fills up with clips from AI-video generators, hacking groups are seeding the online landscape with malware-laced programs…

Botnet
28
May
2025

New PumaBot botnet brute forces SSH credentials to breach devices

A newly discovered Go-based Linux botnet malware named PumaBot is brute-forcing SSH credentials on embedded IoT devices to deploy malicious payloads….

Hackers Exploit SimpleHelp RMM Tool to Deploy DragonForce Ransomware
28
May
2025

Hackers Exploit SimpleHelp RMM Tool to Deploy DragonForce Ransomware

Cybercriminals leveraged critical vulnerabilities in remote monitoring software to breach a managed service provider and attack multiple customers. Cybersecurity researchers…

Russian APT28 Hackers Attacking NATO-aligned organizations to Steal Sensitive data
28
May
2025

Russian APT28 Hackers Attacking NATO-aligned organizations to Steal Sensitive data

Russia’s GRU-backed APT28, widely known as Fancy Bear, has intensified its cyber espionage campaign against NATO-aligned organizations. Active since at…

Post-quantum cryptography standards development and adoption
28
May
2025

Post-Quantum Cryptography Migration Should Start Now

As estimates of the quantum computing power needed to crack current public key encryption algorithms continue to drop, a group…