Main distributor to Whole Foods hit by cyberattack
10
Jun
2025

Main distributor to Whole Foods hit by cyberattack

United Natural Foods, Inc. is dealing with “temporary disruptions” to its operations stemming from “unauthorized activity” involving its information technology…

Texas flag
10
Jun
2025

Texas Dept. of Transportation breached, 300k crash records stolen

The Texas Department of Transportation (TxDOT) is warning that it suffered a data breach after a threat actor downloaded 300,000…

An Open-Source Tool to See Through Encrypted Traffic in Linux systems
10
Jun
2025

An Open-Source Tool to See Through Encrypted Traffic in Linux systems

Qpoint has released Qtap, an open-source eBPF agent for monitoring network traffic in Linux systems. It hooks into TLS/SSL functions…

ISPConfig Vulnerability Allows Privilege Escalation to Superadmin and PHP Code Injection Exploit
10
Jun
2025

ISPConfig Vulnerability Allows Privilege Escalation to Superadmin and PHP Code Injection Exploit

A critical security vulnerability has been identified in ISPConfig version 3.2.12p1, a widely used open-source web hosting control panel. The…

UK finance regulator tie-up with Nvidia allows firms to experiment with AI
10
Jun
2025

UK finance regulator tie-up with Nvidia allows firms to experiment with AI

The UK’s financial services regulator has teamed up with Nvidia to provide an environment to enable finance firms to test…

M&S says hackers gained access to customer data in April cyberattack
10
Jun
2025

Marks & Spencer restores some online-order operations following cyberattack

Marks & Spencer on Tuesday said it has resumed limited online-ordering capabilities after an April cyberattack that led to major…

Ivanti
10
Jun
2025

Ivanti Workspace Control hardcoded key flaws expose SQL credentials

Ivanti has released security updates to fix three high-severity hardcoded key vulnerabilities in the company’s Workspace Control (IWC) solution. IWC…

New SharePoint Phishing Campaigns Employing Deceptive Lick Techniques
10
Jun
2025

New SharePoint Phishing Campaigns Employing Deceptive Lick Techniques

Security analysts at CyberProof’s Security Operations Center (SOC) have identified a sharp rise in phishing campaigns leveraging Microsoft SharePoint to…

20 Top-Level Domain Names Abused by Hackers in Phishing Attacks
10
Jun
2025

20 Top-Level Domain Names Abused by Hackers in Phishing Attacks

Phishing attackers abuse TLDs like .li, .es, and .dev to hide redirects, steal credentials, and bypass detection. See top domains…

Fake Gaming Sites Targets Chrome, Firefox Users
10
Jun
2025

Rust-based Myth Stealer Malware Spread via Fake Gaming Sites Targets Chrome, Firefox Users

Cybersecurity researchers have shed light on a previously undocumented Rust-based information stealer called Myth Stealer that’s being propagated via fraudulent…

Nutanix breaks the bounds of HCI again with Pure Storage linkup
10
Jun
2025

UK defence scheme invests in future cyber tech Cheri

SCI Semiconductors, a Cambridge-based tech company working on Capability Hardware Enhanced Risc Instructions (Cheri) systems to manage cyber defences, is…

From malware to deepfakes, Gen AI is transforming cyberattacks
10
Jun
2025

From malware to deepfakes, Gen AI is transforming cyberattacks

Listen to the article 4 min This audio is auto-generated. Please let us know if you have feedback. NATIONAL HARBOR,…