China-Linked Hackers Exploit SAP and SQL Server Flaws in Attacks Across Asia and Brazil
30
May
2025

China-Linked Hackers Exploit SAP and SQL Server Flaws in Attacks Across Asia and Brazil

May 30, 2025Ravie LakshmananVulnerability / Threat Intelligence The China-linked threat actor behind the recent in-the-wild exploitation of a critical security…

How cyber security professionals are leveraging AWS tools
30
May
2025

How cyber security professionals are leveraging AWS tools

With millions of businesses now using Amazon Web Services (AWS) for their cloud computing needs, it’s become a vital consideration…

CVE-2025-27522
30
May
2025

Apache InLong CVE-2025-27522 Exposes RCE Attacks

A newly disclosed vulnerability, tracked as CVE-2025-27522, has been discovered in Apache InLong, a widely used real-time data streaming platform….

China hackers
30
May
2025

Chinese Hacking Group APT41 Exploits Google Calendar to Target Governments

Chinese state-sponsored threat actor APT41 has targeted government entities with malware that uses Google Calendar for command-and-control (C&C), Google warns….

US Treasury sanctioned the firm Funnull Technology as major cyber scam facilitator
30
May
2025

US Treasury sanctioned the firm Funnull Technology as major cyber scam facilitator

US Treasury sanctioned the firm Funnull Technology as major cyber scam facilitator Pierluigi Paganini May 30, 2025 The U.S. sanctioned…

PortSwigger Honored with the King's Award for Enterprise in International Trade
30
May
2025

PortSwigger Honored with the King’s Award for Enterprise in International Trade

Amelia Coen | 30 May 2025 at 09:38 UTC We’re proud to announce that PortSwigger has been awarded the prestigious…

Microsoft Begins Authenticator Password Phase-Out This Weekend
30
May
2025

Microsoft Begins Authenticator Password Phase-Out This Weekend

This weekend, Microsoft will start turning off password management functionality in its Authenticator app. If you use the app, from…

Malicious AI
30
May
2025

Cybercriminals exploit AI hype to spread ransomware, malware

Threat actors linked to lesser-known ransomware and malware projects now use AI tools as lures to infect unsuspecting victims with…

U.S. Sanctions Cloud Provider ‘Funnull’ as Top Source of ‘Pig Butchering’ Scams – Krebs on Security
30
May
2025

U.S. Sanctions Cloud Provider ‘Funnull’ as Top Source of ‘Pig Butchering’ Scams – Krebs on Security

Image: Shutterstock, ArtHead. The U.S. government today imposed economic sanctions on Funnull Technology Inc., a Philippines-based company that provides computer…

Cops in Germany Claim They've ID'd the Mysterious Trickbot Ransomware Kingpin
30
May
2025

Cops in Germany Claim They’ve ID’d the Mysterious Trickbot Ransomware Kingpin

Several cybersecurity researchers who have tracked Trickbot extensively tell WIRED they were unaware of the announcement. An anonymous account on…

Critical Icinga 2 Vulnerability Allows Attackers to Obtain Valid Certificates
30
May
2025

Critical Icinga 2 Vulnerability Allows Attackers to Obtain Valid Certificates

A critical vulnerability (CVE-2025-48057) has been discovered in Icinga 2, the widely used open-source monitoring platform. The flaw, affecting installations…

CrowdStrike Partners With AARNet to Safeguard Education Sector
30
May
2025

CrowdStrike Partners With AARNet to Safeguard Education Sector

CrowdStrike and Australia’s Academic and Research Network (AARNet) today announced an expanded partnership to deliver CrowdStrike Falcon Complete Next-Gen MDR…