Four successful strategies for public sector technology recruitment
28
May
2025

Four successful strategies for public sector technology recruitment

It has long been recognised that central and local government departments, as well as the public sector more widely, face…

Iranian Man pleaded guilty to role in Robbinhood Ransomware attacks
28
May
2025

Iranian Man pleaded guilty to role in Robbinhood Ransomware attacks

Iranian Man pleaded guilty to role in Robbinhood Ransomware attacks Pierluigi Paganini May 28, 2025 Iranian man pleads guilty to…

CISA Publishes ICS Advisories Highlighting New Vulnerabilities and Exploits
28
May
2025

CISA Publishes ICS Advisories Highlighting New Vulnerabilities and Exploits

On May 27, 2025, the Cybersecurity and Infrastructure Security Agency (CISA) released a new Industrial Control Systems (ICS) advisory—ICSA-25-146-01—highlighting a…

App Store fraud
28
May
2025

Apple App Store Fraud Prevention Blocks $2B In 2024

Apple, in its latest App Store fraud analysis, revealed that the company prevented more than $2 billion in potentially fraudulent…

Cybercriminals Clone Antivirus
28
May
2025

Cybercriminals Clone Antivirus Site to Spread Venom RAT and Steal Crypto Wallets

May 27, 2025Ravie LakshmananMalware / Cybersecurity Cybersecurity researchers have disclosed a new malicious campaign that uses a fake website advertising…

Zero-Interaction libvpx Flaw in Firefox Allows Attackers to Run Arbitrary Code
28
May
2025

Zero-Interaction libvpx Flaw in Firefox Allows Attackers to Run Arbitrary Code

Mozilla has released Firefox 139, addressing several critical and moderate security vulnerabilities that posed significant risks to users. The update,…

Apple App Store Threats
28
May
2025

Apple Blocks $9 Billion in Fraud Over 5 Years Amid Rising App Store Threats

May 28, 2025Ravie LakshmananMobile Security / Software Security Apple on Tuesday revealed that it prevented over $9 billion in fraudulent…

Hottest cybersecurity open-source tools of the month: May 2025
28
May
2025

Hottest cybersecurity open-source tools of the month: May 2025

This month’s roundup features exceptional open-source cybersecurity tools that are gaining attention for strengthening security across various environments. Vuls: Open-source…

Woodpecker: Open-source red teaming for AI, Kubernetes, APIs
28
May
2025

Woodpecker: Open-source red teaming for AI, Kubernetes, APIs

Woodpecker is an open-source tool that automates red teaming, making advanced security testing easier and more accessible. It helps teams…

GitHub becomes go-to platform for malware delivery across Europe
28
May
2025

GitHub becomes go-to platform for malware delivery across Europe

Phishing has become the go-to method for attackers looking to get past security controls and access sensitive environments in Europe,…

Network attacks
28
May
2025

DragonForce ransomware abuses SimpleHelp in MSP supply chain attack

The DragonForce ransomware operation successfully breached a managed service provider and used its SimpleHelp remote monitoring and management (RMM) platform to steal…

Iranian man pleads guilty in Robbinhood ransomware scheme
28
May
2025

Iranian man pleads guilty in Robbinhood ransomware scheme

An Iranian man pleaded guilty Tuesday to participating in the Robbinhood ransomware scheme, which most notably afflicted the city of…