Lenovo CIO Playbook
25
Apr
2025

AI Investment Surge In India, GenAI Leads The Way

Artificial Intelligence (AI) adoption in India is gaining ground, although at a measured pace. A new report released as part…

Chrome UAF Process Vulnerabilities Actively Exploited
25
Apr
2025

Chrome UAF Process Vulnerabilities Actively Exploited

Security researchers have revealed that two critical use-after-free (UAF) vulnerabilities in Google Chrome’s Browser process were actively exploited in the…

Why NHIs Are Security's Most Dangerous Blind Spot
25
Apr
2025

Why NHIs Are Security’s Most Dangerous Blind Spot

When we talk about identity in cybersecurity, most people think of usernames, passwords, and the occasional MFA prompt. But lurking…

Salt Typhoon Campaign Details by FBI
25
Apr
2025

FBI Issues Alert On Salt Typhoon PRC Cyber Campaign

The FBI has issued a public appeal for information concerning an ongoing cyber campaign targeting US telecommunications infrastructure, attributed to…

Lazarus APT targets supply chains in South Korea
25
Apr
2025

Lazarus APT targets supply chains in South Korea

Operation SyncHole: Lazarus APT targets supply chains in South Korea Pierluigi Paganini April 25, 2025 The North Korea-linked Lazarus Group…

Hackers Allegedly Breach TikTok, Exposing Over 900,000 Usernames & Passwords
25
Apr
2025

Hackers Allegedly Breach TikTok, Exposing Over 900,000 Usernames & Passwords

A hacking collective identifying itself as R00TK1T has claimed responsibility for a massive data breach affecting TikTok, allegedly exposing the…

New Report Reveals How AI is Rapidly Enhancing Phishing Attack Precision
25
Apr
2025

New Report Reveals How AI is Rapidly Enhancing Phishing Attack Precision

The Zscaler ThreatLabz 2025 Phishing Report unveils the alarming sophistication of modern phishing attacks, driven by generative AI (GenAI). By…

North Korean Hackers Use Fake Crypto Firms in Job Malware Scam
25
Apr
2025

North Korean Hackers Use Fake Crypto Firms in Job Malware Scam

Silent Push reveals a complex scheme where North Korean hackers posed as crypto companies, using AI and fake job interviews…

SAP Confirms Critical NetWeaver Flaw Amid Suspected Zero-Day Exploitation by Hackers
25
Apr
2025

SAP Confirms Critical NetWeaver Flaw Amid Suspected Zero-Day Exploitation by Hackers

Apr 25, 2025Ravie LakshmananVulnerability / Enterprise Security Threat actors are likely exploiting a new vulnerability in SAP NetWeaver to upload…

Commvault Vulnerability
25
Apr
2025

CSA Warns Of Commvault Vulnerability (CVE-2025-34028)

The Cyber Security Agency of Singapore (CSA) has warned users about a critical vulnerability affecting the Commvault Command Center. This…

New Toolkit That Evades Microsoft Office 365 MFA
25
Apr
2025

New Toolkit That Evades Microsoft Office 365 MFA

A sophisticated new phishing toolkit named “SessionShark” has been specifically designed to circumvent Microsoft Office 365’s multi-factor authentication (MFA) protections….

Hackers Exploit MS-SQL Servers to Deploy Ammyy Admin for Remote Access
25
Apr
2025

Hackers Exploit MS-SQL Servers to Deploy Ammyy Admin for Remote Access

A sophisticated cyberattack campaign has surfaced, targeting poorly managed Microsoft SQL (MS-SQL) servers to deploy malicious tools like Ammyy Admin…