Jane Devry
19
May
2025

Mitigating Insider Threats and Zombie Accounts Amid Workforce and Contract Changes

The recent Twitter data leak, which exposed the personal information of 2.8 billion users, serves as a stark reminder of…

Windows Remote Desktop Gateway UAF Vulnerability Allows Remote Code Execution
19
May
2025

Windows Remote Desktop Gateway UAF Vulnerability Allows Remote Code Execution

A critical vulnerability in Microsoft’s Remote Desktop Gateway (RD Gateway) that could allow attackers to execute malicious code on affected…

Riverina Water revamps its ERP
19
May
2025

Riverina Water revamps its ERP

Riverina Water has revamped its asset management, finance and billing portals as part of a $4.5 million digital transformation, leading…

Bendigo and Adelaide Bank tackles Kafka growth since open banking
19
May
2025

Bendigo and Adelaide Bank tackles Kafka growth since open banking

Bendigo and Adelaide Bank will switch on chargeback for internal departments using Kafka resources from July, but is already realising…

Vodafone refers Telstra to ACCC over mobile coverage
19
May
2025

Vodafone refers Telstra to ACCC over mobile coverage

TPG Telecom-owned Vodafone has reported Telstra to Australia’s competition watchdog and is “considering” legal action over mobile coverage claims. The…

Microsoft makes Office-Teams offer in Europe
18
May
2025

Microsoft makes Office-Teams offer in Europe

Microsoft has offered to make its Office product without Teams cheaper than when sold with Teams, EU antitrust regulators said,…

Russia-Linked SpyPress Malware Exploits Webmails to Spy on Ukraine
18
May
2025

Russia-Linked SpyPress Malware Exploits Webmails to Spy on Ukraine

ESET reports on RoundPress, a cyber espionage campaign by Russia’s Fancy Bear (Sednit) targeting Ukraine-related organizations via webmail vulnerabilities and…

FBI Warns of AI Voice Scams Impersonating US Govt Officials
18
May
2025

FBI Warns of AI Voice Scams Impersonating US Govt Officials

FBI has warned about a sophisticated vishing and smishing campaign using AI-generated voice memos to impersonate senior US officials and…

CORS Misconfigurations: Advanced Exploitation Guide
18
May
2025

CORS Misconfigurations: Advanced Exploitation Guide

CORS misconfiguration vulnerabilities are a highly underestimated vulnerability class. With an impact ranging from sensitive information disclosure to facilitating SSRF…

How the Signal Knockoff App TeleMessage Got Hacked in 20 Minutes
18
May
2025

How the Signal Knockoff App TeleMessage Got Hacked in 20 Minutes

They tried logging into secure.telemessage.com using a pair of these credentials and discovered that they had just hacked a user…

Experts found rogue devices, including hidden cellular radios, in Chinese-made power inverters used worldwide
18
May
2025

Experts found rogue devices, including hidden cellular radios, in Chinese-made power inverters used worldwide

Experts found rogue devices, including hidden cellular radios, in Chinese-made power inverters used worldwide Pierluigi Paganini May 18, 2025 Chinese…

Week in review: Microsoft patches 5 actively exploited 0-days, recently fixed Chrome vulnerability exploited
18
May
2025

Week in review: Microsoft patches 5 actively exploited 0-days, recently fixed Chrome vulnerability exploited

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Patch Tuesday: Microsoft fixes 5…