8 use cases for generative AI in manufacturing
12
Jun
2025

8 use cases for generative AI in manufacturing

In recent years, manufacturing has dramatically modernized, particularly with the implementation of new tools such as generative AI. Contemporary production…

Fog ransomware attack uses unusual mix of legitimate and open-source tools
12
Jun
2025

Fog ransomware attack uses unusual mix of legitimate and open-source tools

Fog ransomware hackers are using an uncommon toolset, which includes open-source pentesting utilities and a legitimate employee monitoring software called Syteca. The…

New Campaign Targets Entra ID User Accounts Using Pentesting Tool for Account Takeover
12
Jun
2025

New Campaign Targets Entra ID User Accounts Using Pentesting Tool for Account Takeover

Proofpoint Threat Intelligence has uncovered a large-scale Account Takeover (ATO) campaign, internally tracked as UNK_SneakyStrike, that leverages the open-source penetration…

Agentforce London: 78% of UK companies use agentic AI, says Salesforce
12
Jun
2025

Agentforce London: 78% of UK companies use agentic AI, says Salesforce

Salesforce has released survey data that says 78% of UK organisations are using agentic artificial intelligence (AI). The findings, provided…

CISA Releases Guide to Protect Network Edge Devices From Hackers
12
Jun
2025

CISA Releases Guide to Protect Network Edge Devices From Hackers

CISA and international cybersecurity partners have released a comprehensive suite of guidance documents aimed at protecting critical network edge devices…

Windows SMB Client Zero-Day Vulnerability Exploited via Reflective Kerberos Relay Attack
12
Jun
2025

Windows SMB Client Zero-Day Vulnerability Exploited via Reflective Kerberos Relay Attack

A newly disclosed vulnerability, CVE-2025-33073, dubbed the “Reflective Kerberos Relay Attack,” has shaken the Windows security landscape. Discovered by RedTeam…

ConnectWise to Rotate ScreenConnect Code Signing Certificates Due to Security Risks
12
Jun
2025

ConnectWise to Rotate ScreenConnect Code Signing Certificates Due to Security Risks

Jun 12, 2025Ravie LakshmananVulnerability / Software Security ConnectWise has disclosed that it’s planning to rotate the digital code signing certificates…

Hackers Advertising New Nytheon AI Blackhat Tool on popular Hacking Forums
12
Jun
2025

Hackers Advertising New Nytheon AI Blackhat Tool on popular Hacking Forums

A sophisticated new threat platform, Nytheon AI, has emerged, which combines multiple uncensored large language models (LLMs) built specifically for…

0-Click Vulnerability in Microsoft 365 Copilot Exposes Sensitive Data via Teams
12
Jun
2025

0-Click Vulnerability in Microsoft 365 Copilot Exposes Sensitive Data via Teams

Security researchers have uncovered the first-ever zero-click vulnerability in an AI agent, targeting Microsoft 365 Copilot and potentially exposing sensitive…

Lemony mitigates privacy and compliance risks associated with cloud-based AI
12
Jun
2025

Lemony mitigates privacy and compliance risks associated with cloud-based AI

Lemony announced its on-premise artificial intelligence solution that is redefining how organizations deploy generative AI. Lemony’s secure, hardware-based node offers…

40,000 security cameras vulnerable to remote hacking
12
Jun
2025

40,000 security cameras vulnerable to remote hacking

Exposed eyes: 40,000 security cameras vulnerable to remote hacking Pierluigi Paganini June 12, 2025 Over 40,000 internet-exposed security cameras worldwide…

Nytheon AI Tool Gaining Traction on Hacking Forums for Malicious Activities
12
Jun
2025

Nytheon AI Tool Gaining Traction on Hacking Forums for Malicious Activities

The emergence of Nytheon AI marks a significant escalation in the landscape of uncensored large language model (LLM) platforms. Unlike…