Russian court releases several REvil ransomware gang members
24
Jun
2025

Russian court releases several REvil ransomware gang members

Four members of the notorious cybercriminal group REvil were found guilty of financial fraud and computer crimes targeting primarily American…

1inch rolls out expanded bug bounties with rewards up to $500K
24
Jun
2025

1inch rolls out expanded bug bounties with rewards up to $500K

Five dedicated bug bounty programs upgraded across 1inch core components, including smart contracts, wallet and infrastructure. A community-first approach to…

China-linked LapDogs Campaign Drops ShortLeash Backdoor with Fake Certs
24
Jun
2025

China-linked LapDogs Campaign Drops ShortLeash Backdoor with Fake Certs

Cybersecurity experts at SecurityScorecard have discovered a widespread cyber espionage operation, dubbed LapDogs, which has compromised an unknown number of…

SA Water plans 'once-in-a-generation' core technology uplift
24
Jun
2025

SA Water plans ‘once-in-a-generation’ core technology uplift

SA Water is embarking on a multi-year IT transformation program focused on redesigning and modernising its core systems. Elise Vervetjes…

Google Integrates GenAI to Counter Indirect Prompt Injection Attack Vectors
24
Jun
2025

Google Integrates GenAI to Counter Indirect Prompt Injection Attack Vectors

Google has revealed a thorough protection technique aimed at indirect prompt injection attacks, a subtle but powerful threat, marking a…

How NAB unwound Teradata's 'tentacles' to decommission it
24
Jun
2025

How NAB unwound Teradata’s ‘tentacles’ to decommission it

NAB has detailed its 2023 Teradata decommissioning publicly for the first time, revealing how the data team rebuffed pressure to…

Critical Teleport Vulnerability Let Attackers Remotely Bypass Authentication Controls
23
Jun
2025

Critical Teleport Vulnerability Let Attackers Remotely Bypass Authentication Controls

Summary 1. CVE-2025-49825 allows attackers to remotely bypass Teleport’s authentication controls, affecting multiple versions of the secure access platform. 2. Teleport…

UAC-0001 Hackers Target ICS Devices Running Windows-Based Server Systems
23
Jun
2025

UAC-0001 Hackers Target ICS Devices Running Windows-Based Server Systems

The national team for responding to cyber incidents, CERT-UA, has exposed a sophisticated cyberattack targeting the information and communication system…

1inch rolls out expanded bug bounties with rewards up to $500K
23
Jun
2025

1inch rolls out expanded bug bounties with rewards up to $500K

Five dedicated bug bounty programs upgraded across 1inch core components, including smart contracts, wallet and infrastructure. A community-first approach to…

APT36 Hackers Target Indian Defense Personnel with Sophisticated Phishing Campaign
23
Jun
2025

APT36 Hackers Target Indian Defense Personnel with Sophisticated Phishing Campaign

APT36, also known as Transparent Tribe, a Pakistan-based cyber espionage group, has launched a highly sophisticated phishing campaign targeting Indian…

New Echo Chamber Attack Jailbreaks Most AI Models by Weaponizing Indirect References
23
Jun
2025

New Echo Chamber Attack Jailbreaks Most AI Models by Weaponizing Indirect References

Summary 1. Harmful Objective Concealed: Attacker defines a harmful goal but starts with benign prompts. 2. Context Poisoning: Introduces subtle…

Shadow Vector Malware Uses SVG Images to Deliver AsyncRAT and RemcosRAT Payloads
23
Jun
2025

Shadow Vector Malware Uses SVG Images to Deliver AsyncRAT and RemcosRAT Payloads

Acronis Threat Research Unit (TRU) has discovered a startling development: a malicious campaign called “Shadow Vector” is actively targeting Colombian…