China's Salt Typhoon hacks US telecoms firms
28
May
2025

Czech Government Condemns Chinese Hack on Critical Infrastructure

The Czech government delivered a pointed warning to China on Wednesday, publicly attributing a years-long intrusion in the foreign ministry’s…

Zscaler enters agreement to buy Red Canary
28
May
2025

Zscaler enters agreement to buy Red Canary

Zscaler on Tuesday said it had agreed to buy Red Canary, a leading provider of managed detection and response technology. …

XenServer VM Tools for Windows Vulnerability Let Attackers Execute Arbitrary Code
28
May
2025

XenServer VM Tools for Windows Vulnerability Let Attackers Execute Arbitrary Code

Three critical vulnerabilities in XenServer VM Tools for Windows allow attackers to execute arbitrary code and escalate privileges within guest…

DragonForce Ransomware Actors Exploits RMM Tools to Gain Acces to organizations
28
May
2025

DragonForce Ransomware Actors Exploits RMM Tools to Gain Acces to organizations

Sophos Managed Detection and Response (MDR) successfully responded to a sophisticated targeted attack orchestrated by threat actors leveraging DragonForce ransomware….

Malware Hidden in AI Models on PyPI Targets Alibaba AI Labs Users
28
May
2025

Malware Hidden in AI Models on PyPI Targets Alibaba AI Labs Users

ReversingLabs discovers new malware hidden inside AI/ML models on PyPI, targeting Alibaba AI Labs users. Learn how attackers exploit Pickle…

Microsoft, Dutch government spot new Russian hacking group targeting critical infrastructure
28
May
2025

Microsoft, Dutch government spot new Russian hacking group targeting critical infrastructure

Listen to the article 4 min This audio is auto-generated. Please let us know if you have feedback. A previously…

The Future of Cybersecurity - Trends Shaping the Industry
28
May
2025

The Future of Cybersecurity – Trends Shaping the Industry

As digital transformation accelerates across industries, the cybersecurity landscape is changing. 2025 marks a pivotal moment, with organizations worldwide facing…

Evertz SDN Vulnerabilities Enable Unauthenticated Arbitrary Command Execution
28
May
2025

Evertz SDN Vulnerabilities Enable Unauthenticated Arbitrary Command Execution

A newly disclosed critical vulnerability (CVE-2025-4009) in Evertz’s Software Defined Video Network (SDVN) product line exposes a wide range of…

Microsoft OneDrive File Picker Flaw Grants Apps Full Cloud Access — Even When Uploading Just One File
28
May
2025

Microsoft OneDrive File Picker Flaw Grants Apps Full Cloud Access — Even When Uploading Just One File

May 28, 2025Ravie LakshmananData Privacy / Vulnerability Cybersecurity researchers have discovered a security flaw in Microsoft’s OneDrive File Picker that,…

New PumaBot targets Linux IoT surveillance devices
28
May
2025

New PumaBot targets Linux IoT surveillance devices

New PumaBot targets Linux IoT surveillance devices Pierluigi Paganini May 28, 2025 PumaBot targets Linux IoT devices, using SSH brute-force…

China
28
May
2025

Czechia blames China for Ministry of Foreign Affairs cyberattack

The Czech Republic says the Chinese-backed APT31 hacking group was behind cyberattacks targeting the country’s Ministry of Foreign Affairs and…

251 Malicious IPs Attacking Cloud-Based Devices Leveraging 75 Exposure Points
28
May
2025

251 Malicious IPs Attacking Cloud-Based Devices Leveraging 75 Exposure Points

A highly coordinated reconnaissance campaign that deployed 251 malicious IP addresses in a single-day operation targeting cloud-based infrastructure.  The attack,…