12
May
2025

University will ‘pull the plug’ to test Nutanix disaster recovery

The University of Reading’s IT team plans to “pull the plug” on its Nutanix-based infrastructure to test disaster recovery readiness…

Cybercrime Escalates in 2025 as Hackers Target Everyday Devices with Sophisticated Attacks
12
May
2025

Cybercrime Escalates in 2025 as Hackers Target Everyday Devices with Sophisticated Attacks

The global cost of cybercrime is projected to reach $10.5 trillion annually by 2025, underscoring the unprecedented scale of digital…

Hackers Exploit Legacy Protocols in Microsoft Entra ID to Bypass MFA and Conditional Access
12
May
2025

Hackers Exploit Legacy Protocols in Microsoft Entra ID to Bypass MFA and Conditional Access

A sophisticated and highly coordinated cyberattack campaign came to light, as tracked by Guardz Research. This operation zeroed in on…

Passwordless authentication: Where security meets productivity
12
May
2025

Passwordless authentication: Where security meets productivity

According to Verizon’s 2024 Data Breach Investigations Report, 80% of breaches stem from compromised credentials. While passwords were meant to…

Hackers Exploit Copilot AI for SharePoint to Access Passwords & Other Sensitive Data
12
May
2025

Hackers Exploit Copilot AI for SharePoint to Access Passwords & Other Sensitive Data

Multiple vulnerabilities in Microsoft’s Copilot AI for SharePoint, enabling attackers to access sensitive corporate data including passwords, API keys, and…

Google Researchers Use Mach IPC to Uncover Sandbox Escape Vulnerabilities
12
May
2025

Google Researchers Use Mach IPC to Uncover Sandbox Escape Vulnerabilities

Google Project Zero researchers have uncovered new sandbox escape vulnerabilities in macOS using an innovative approach that leverages Mach Interprocess…

Fake AI Tools Used to Spread Malware
12
May
2025

Fake AI Tools Used to Spread Noodlophile Malware, Targeting 62,000+ via Facebook Lures

May 12, 2025Ravie LakshmananMalware / Artificial Intelligence Threat actors have been observed leveraging fake artificial intelligence (AI)-powered tools as a…

CVE-2024-26809
12
May
2025

CVE-2024-26809: Linux Nftables Double-Free Vulnerability

A critical security flaw has been discovered in the Linux kernel’s nftables subsystem, which is responsible for packet filtering in…

PoC Exploit Released For Linux Kernel’s nftables Subsystem Vulnerability
12
May
2025

PoC Exploit Released For Linux Kernel’s nftables Subsystem Vulnerability

A critical Proof-of-Concept (PoC) exploit has been released for a significant vulnerability in the Linux kernel’s nftables subsystem, tracked as…

Cybercriminals Hide Undetectable Ransomware Inside JPG Images
12
May
2025

Cybercriminals Hide Undetectable Ransomware Inside JPG Images

A chilling new ransomware attack method has emerged, with hackers exploiting innocuous JPEG image files to deliver fully undetectable (FUD) ransomware,…

New Phishing Attack Abusing Blob URLs to Bypass SEGs and Evade Analysis
12
May
2025

New Phishing Attack Abusing Blob URLs to Bypass SEGs and Evade Analysis

Cybersecurity experts have identified a sophisticated phishing technique that exploits blob URIs (Uniform Resource Identifiers) to evade detection by Secure…

Microsoft Teams to Safeguard Meetings by Blocking Screen Snaps
12
May
2025

Microsoft Teams to Safeguard Meetings by Blocking Screen Snaps

Microsoft has announced the upcoming release of a groundbreaking “Prevent Screen Capture” feature for Teams, designed to block unauthorized screenshots…