BEARDSHELL Malware and COVENANT
24
Jun
2025

APT28 Uses Signal Chat to Deploy BEARDSHELL Malware and COVENANT in Ukraine

Jun 24, 2025Ravie LakshmananMalware / Threat Intelligence The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of a new…

Google I/O: LLM capabilities power agentic AI search
24
Jun
2025

CMA consults on Google’s search dominance

Under the Digital Markets Competition Regime, the Competition and Markets Authority (CMA) has proposed to designate Google with “strategic market…

OWASP AI Testing Guide - A New Project to Detect Vulnerabilities in AI Applications
24
Jun
2025

OWASP AI Testing Guide – A New Project to Detect Vulnerabilities in AI Applications

The Open Web Application Security Project (OWASP) has announced the development of a comprehensive OWASP AI Testing Guide, marking a…

LapDogs Hackers Compromise 1,000 SOHO Devices Using Custom Backdoor for Stealthy Attacks
24
Jun
2025

LapDogs Hackers Compromise 1,000 SOHO Devices Using Custom Backdoor for Stealthy Attacks

Security researchers at SecurityScorecard have uncovered a sprawling cyber-espionage campaign orchestrated by the LapDogs Operational Relay Box (ORB) Network, a…

U.S. House Bans WhatsApp
24
Jun
2025

U.S. House Bans WhatsApp on Official Devices Over Security and Data Protection Issues

Jun 24, 2025Ravie LakshmananData Protection / Mobile Security The U.S. House of Representatives has formally banned congressional staff members from…

U.S. warns of incoming cyber threats following Iran airstrikes
24
Jun
2025

U.S. warns of incoming cyber threats following Iran airstrikes

U.S. warns of incoming cyber threats following Iran airstrikes Pierluigi Paganini June 24, 2025 U.S. warns of cyberattacks by pro-Iranian…

Advanced Malware Campaign Targets WordPress and WooCommerce Sites with Hidden Skimmers
24
Jun
2025

Advanced Malware Campaign Targets WordPress and WooCommerce Sites with Hidden Skimmers

The Wordfence Threat Intelligence Team uncovered a sophisticated malware campaign during a routine site cleanup, revealing a family of malicious…

Common Good Cyber Fund launches to support nonprofits protecting the internet
24
Jun
2025

Common Good Cyber Fund launches to support nonprofits protecting the internet

The Common Good Cyber Fund is a new effort to support cybersecurity that protects everyone, especially those most at risk…

Digital ID: cool or contentious?
24
Jun
2025

Digital ID: cool or contentious?

Thank you for joining! Access your Pro+ Content below. 24 June 2025 Digital ID: cool or contentious? Share this item…

China-linked APT Salt Typhoon targets Canadian Telecom companies
24
Jun
2025

China-linked APT Salt Typhoon targets Canadian Telecom companies

China-linked APT Salt Typhoon targets Canadian Telecom companies Pierluigi Paganini June 24, 2025 Canada and FBI warn of China-linked APT…

what’s best for your business?
24
Jun
2025

what’s best for your business?

Organizations are adopting bug bounty programs more and more as part of a layered security strategy to address the skills…

WinRAR Directory Vulnerability Let Execute Arbitrary Code Using a Malicious File
24
Jun
2025

WinRAR Directory Vulnerability Let Execute Arbitrary Code Using a Malicious File

Summary 1. A high-severity flaw (CVE-2025-6218) in WinRAR allows attackers to execute arbitrary code by exploiting how the software handles…