AI should be used to improve boardroom efficiency
02
Jun
2025

AI should be used to improve boardroom efficiency

Members of the board in businesses are missing out on the potential to ensure artificial intelligence (AI) manages the regulatory…

Chrome
02
Jun
2025

Chrome to Distrust Chunghwa Telecom and Netlock Certificates

Google on Friday announced that the Chrome Root Store will no longer trust digital certificates issued by Chunghwa Telecom and…

Role of Threat Intelligence in Proactive Defense Strategies
02
Jun
2025

Role of Threat Intelligence in Proactive Defense Strategies

Organizations worldwide increasingly recognize that traditional reactive cybersecurity approaches are no longer sufficient to combat sophisticated cyber threats. A comprehensive…

CISO Roles Take on Strategic Security Leadership Roles Beyond Cybersecurity as Organizations
02
Jun
2025

CISO Roles Take on Strategic Security Leadership Roles Beyond Cybersecurity as Organizations

A comprehensive analysis of over 800 Chief Information Security Officers reveals a fundamental transformation in the cybersecurity leadership landscape, with…

Hacker unmasked
02
Jun
2025

Alleged Conti, TrickBot Gang Leader Unmasked

German authorities have named Russian national Vitaly Nikolaevich Kovalev as the founder and leader of the TrickBot cybercrime gang. Established…

Hackers Weaponized Free SSH Client Putty to Attack Windows Systems With Malware
02
Jun
2025

Hackers Weaponized Free SSH Client Putty to Attack Windows Systems With Malware

A sophisticated malware campaign that exploits legitimate SSH clients, including both the popular PuTTY application and Windows’ built-in OpenSSH implementation,…

Critical Denodo Scheduler Flaw Allows Remote Code Execution by Attackers
02
Jun
2025

Critical Denodo Scheduler Flaw Allows Remote Code Execution by Attackers

Denodo, a provider of logical data management software, recently faced a critical security vulnerability in its Denodo Scheduler product. This…

Backdoors in Python and NPM Packages Target Windows and Linux
02
Jun
2025

Backdoors in Python and NPM Packages Target Windows and Linux

New research from Checkmarx Zero has unveiled a unique malicious software campaign that targets Python and NPM users on both…

Technical Details Published for Critical Cisco IOS XE Vulnerability
02
Jun
2025

Technical Details Published for Critical Cisco IOS XE Vulnerability

Technical details have been released for a recently patched critical-severity vulnerability in Cisco IOS XE that could be exploited for…

Denodo Scheduler Vulnerability Let Attackers Execute Remote Code
02
Jun
2025

Denodo Scheduler Vulnerability Let Attackers Execute Remote Code

A significant security vulnerability has been discovered in Denodo Scheduler, a data management software component, that allows attackers to execute…

Critical Roundcube Flaw Allows Remote Code Execution by Attackers
02
Jun
2025

Critical Roundcube Flaw Allows Remote Code Execution by Attackers

Roundcube Webmail, one of the most widely used browser-based IMAP clients, has released urgent security updates for its 1.6 and…

Infosecurity 2025: NCA cyber intelligence head spells out trends
02
Jun
2025

Infosecurity 2025: NCA cyber intelligence head spells out trends

Will Lyne, head of cyber intelligence at the National Crime Agency, is speaking at this week’s Infosecurity Europe conference about…