O2 VoLTE Flaw Allows Tracking of Customers’ Locations Through Phone Calls
20
May
2025

O2 VoLTE Flaw Allows Tracking of Customers’ Locations Through Phone Calls

Significant privacy vulnerability in O2 UK’s Voice over LTE (VoLTE) implementation was recently discovered, allowing any caller to access precise…

Naveen Goud
20
May
2025

UK Cyber Crime takes a new turn towards TV show the Blacklist

Cybercriminals in the UK have recently shifted their attention to a new, high-profile target: UK retailers. This marks a significant…

Go-Based Malware
20
May
2025

Go-Based Malware Deploys XMRig Miner on Linux Hosts via Redis Configuration Abuse

May 20, 2025Ravie LakshmananLinux / Cryptojacking Cybersecurity researchers are calling attention to a new Linux cryptojacking campaign that’s targeting publicly…

Tor Browser 14.5.2 Released: Bug Fixes and Enhanced Features
20
May
2025

Tor Browser 14.5.2 Released: Bug Fixes and Enhanced Features

Tor Project has launched Tor Browser 14.5.2, a significant update addressing security vulnerabilities, refining cross-platform functionality, and enhancing build system…

Jane Devry
20
May
2025

Engineering Calm in Crisis: Lessons from the Frontlines of Security

High-pressure incidents can be defining moments for organizations, demanding immediate, coordinated, and often high-stakes responses. In the realm of cybersecurity,…

Tackling the UK’s cyber threats
20
May
2025

Tackling the UK’s cyber threats

Thank you for joining! Access your Pro+ Content below. 20 May 2025 Tackling the UK’s cyber threats Share this item…

23andMe
20
May
2025

23andMe To Be Acquired By Regeneron After Bankruptcy Filing

Regeneron Pharmaceuticals, a leading U.S.-based biotechnology company, has announced it will acquire most of the assets of 23andMe, a consumer…

Anatomy of a Double Extortion Gang
20
May
2025

Anatomy of a Double Extortion Gang

Sarcoma Ransomware Unveiled: Anatomy of a Double Extortion Gang Pierluigi Paganini May 20, 2025 Cybersecurity Observatory of the Unipegaso’s malware…

Critical pfSense Firewall Flaws Enable Attackers to Inject Malicious Code
20
May
2025

Critical pfSense Firewall Flaws Enable Attackers to Inject Malicious Code

Security researchers have uncovered three critical vulnerabilities in pfSense firewall software that could allow attackers to inject malicious code, corrupt…

Jane Devry
20
May
2025

The Rise of Shadow Apps: How Rogue Spreadsheets Are Undermining Your Business

Expert reveals “the reason why shadow apps are multiplying rapidly is because it’s often faster to fix workflow issues that…

Malicious PyPI Packages
20
May
2025

Malicious PyPI Packages Exploit Instagram and TikTok APIs to Validate User Accounts

Cybersecurity researchers have uncovered malicious packages uploaded to the Python Package Index (PyPI) repository that act as checker tools to…

GitHub Releases Copilot Coding Agent
20
May
2025

GitHub Releases Copilot Coding Agent

GitHub Copilot now includes an asynchronous coding agent embedded directly in GitHub and accessible from VS Code—creating a powerful Agentic…