US Customs and Border Protection Plans to Photograph Everyone Exiting the US by Car
09
May
2025

US Customs and Border Protection Plans to Photograph Everyone Exiting the US by Car

United States Customs and Border Protection plans to log every person leaving the country by vehicle by taking photos at…

Cyberattackers Targeting IT Help Desks for Initial Breach
09
May
2025

Cyberattackers Targeting IT Help Desks for Initial Breach

Cybercriminals are increasingly impersonating IT support personnel and trusted authorities to manipulate victims into granting access to critical systems, according…

Broadcom letters demonstrate push to VMware subscriptions
09
May
2025

Broadcom letters demonstrate push to VMware subscriptions

Concerns over support for VMware recently made the headlines following a critical vulnerability and the subsequent patch, which was limited…

Critical vulnerability in SAP NetWeaver under threat of active exploitation
09
May
2025

SAP NetWeaver exploitation enters second wave of threat activity

A second wave of cyberattacks is targeting a critical vulnerability in SAP NetWeaver Visual Composer, according to researchers. Following the…

SAP
09
May
2025

Chinese hackers behind attacks targeting SAP NetWeaver servers

Forescout Vedere Labs security researchers have linked ongoing attacks targeting a maximum severity vulnerability impacting SAP NetWeaver instances to a…

Malicious Python Package Impersonates Discord Developers to Deploy Remote Commands
09
May
2025

Malicious Python Package Impersonates Discord Developers to Deploy Remote Commands

A seemingly innocuous Python package named ‘discordpydebug’ surfaced on the Python Package Index (PyPI) under the guise of “Discord py…

Phishing Attack Uses Blob URIs to Show Fake Login Pages in Your Browser
09
May
2025

Phishing Attack Uses Blob URIs to Show Fake Login Pages in Your Browser

Cofense Intelligence reveals a novel phishing technique using blob URIs to create local fake login pages, bypassing email security and…

Threats versus potential benefits: Weighing up the enterprise risk of embracing AI
09
May
2025

Threats versus potential benefits: Weighing up the enterprise risk of embracing AI

Throwing artificial intelligence (AI) tools at a wall and seeing what sticks will most probably deliver mixed results. Therefore, to…

CIOs pay too much for not enough IT security
09
May
2025

CIOs pay too much for not enough IT security

Listen to the article 3 min This audio is auto-generated. Please let us know if you have feedback. Dive Brief:…

Scattered Spider Malware Targets Klaviyo, HubSpot, and Pure Storage Platforms
09
May
2025

Scattered Spider Malware Targets Klaviyo, HubSpot, and Pure Storage Platforms

Silent Push researchers have identified that the notorious hacker collective Scattered Spider, also known as UNC3944 or Octo Tempest, continues…

Naveen Goud
09
May
2025

No cyber threat to India ATMs from Pakistan Ransomware Attack

In recent days, relations between nuclear-armed neighbors India and Pakistan have become increasingly tense following a terrorist attack in Pahalgam,…

Ransomware: What the LockBit 3.0 data leak reveals
09
May
2025

Ransomware: What the LockBit 3.0 data leak reveals

On 7 May 2024, the presumed identity of the operator of the LockBit 3.0 franchise, also known as LockBitSupp, was…