Google addresses 34 high-severity vulnerabilities in June’s Android security update
03
Jun
2025

Google addresses 34 high-severity vulnerabilities in June’s Android security update

Google’s June security update for Android devices contains 34 vulnerabilities, all of which the company designates as high-severity defects. The…

Android Security Update - Patch for Vulnerabilities that Allows Privilege Escalation
03
Jun
2025

Android Security Update – Patch for Vulnerabilities that Allows Privilege Escalation

Google has released a comprehensive security update for Android devices addressing multiple high-severity vulnerabilities that could allow privilege escalation and…

CISA Alerts on ConnectWise ScreenConnect Authentication Vulnerability Actively Exploited
03
Jun
2025

CISA Alerts on ConnectWise ScreenConnect Authentication Vulnerability Actively Exploited

A critical improper authentication vulnerability has been discovered in ConnectWise ScreenConnect, tracked as CVE-2025-3935 and mapped to CWE-287 (Improper Authentication)….

Telstra server migration cut access to emergency number
03
Jun
2025

Telstra server migration cut access to emergency number

Telstra accidentally disabled an emergency call service for people with hearing and speech impairments last year after a server migration….

Building a Scalable Cybersecurity Training Program
03
Jun
2025

Building a Scalable Cybersecurity Training Program

As cyber threats evolve at an unprecedented pace, organizations worldwide are racing to develop more effective and scalable cybersecurity training…

North Face Fashion Brand Alerts Customers to Credential Stuffing Attack
03
Jun
2025

North Face Fashion Brand Alerts Customers to Credential Stuffing Attack

The North Face, a prominent outdoor fashion brand under VF Outdoor, LLC, detected unusual activity on its website, thenorthface.com. Following…

David Jones shapes store design, lease negotiations with customer feedback
03
Jun
2025

David Jones shapes store design, lease negotiations with customer feedback

David Jones is using customer feedback to influence everything from store leasing conversations to store refreshes and product selection, through…

Threat Modeling for DevSecOps Practical Guide
03
Jun
2025

Threat Modeling for DevSecOps Practical Guide

As organizations accelerate their digital transformation initiatives, threat modeling is rapidly becoming an indispensable practice within DevSecOps frameworks, driving significant…

Android Security Update Addresses High-Severity Privilege Escalation Flaws
03
Jun
2025

Android Security Update Addresses High-Severity Privilege Escalation Flaws

The Android Security Bulletin for June 2025, published on June 2, details a series of high-severity vulnerabilities affecting a wide…

Coinbase
03
Jun
2025

Coinbase breach tied to bribed TaskUs support agents in India

A recently disclosed data breach at Coinbase has been linked to India-based customer support representatives from outsourcing firm TaskUs, who threat…

10-Year-Old Roundcube RCE Vulnerability Let Attackers Execute Malicious Code
03
Jun
2025

10-Year-Old Roundcube RCE Vulnerability Let Attackers Execute Malicious Code

A decade-old critical security vulnerability has been discovered in Roundcube Webmail that could allow authenticated attackers to execute arbitrary code…

State-Sponsored Groups Intensify Attacks on Manufacturing Sector and OT Systems
03
Jun
2025

State-Sponsored Groups Intensify Attacks on Manufacturing Sector and OT Systems

The manufacturing sector has emerged as a prime target for cyber attackers in 2024, with a staggering 71% surge in…