Printer Company Offered Malicious Drivers Infected With XRed Malware
17
May
2025

Printer Company Offered Malicious Drivers Infected With XRed Malware

In a concerning cybersecurity incident, printer manufacturer Procolored unknowingly distributed malware-infected software for approximately six months, ending in May 2025….

VMware ESXi, Firefox, Red Hat Linux & SharePoint Hacked
17
May
2025

VMware ESXi, Firefox, Red Hat Linux & SharePoint Hacked

Security researchers demonstrated their prowess on the second day of Pwn2Own Berlin 2025, discovering critical vulnerabilities across major enterprise platforms…

Guide to Cloud API Security
17
May
2025

Guide to Cloud API Security

As organizations accelerate cloud adoption, API token abuse has emerged as a critical vulnerability vector. Recent incidents at significant platforms…

Coinbase Will Reimburse Customers Up to $400 Million After Data Breach
17
May
2025

Coinbase Will Reimburse Customers Up to $400 Million After Data Breach

As analysts and governments around the world continue to call attention to North Korean digital fraud, researchers this week published…

AI-Powered Cyber Threats - Building Resilient Defenses
17
May
2025

AI-Powered Cyber Threats – Building Resilient Defenses

The cybersecurity landscape has entered a new era of asymmetric warfare, where artificial intelligence amplifies attack capabilities and defensive strategies….

New FrigidStealer Malware Attacking macOS Users to Steal Login Credentials
17
May
2025

New FrigidStealer Malware Attacking macOS Users to Steal Login Credentials

FrigidStealer, a sophisticated information-stealing malware that emerged in January 2025, is actively targeting macOS endpoints to steal sensitive user data…

U.S. CISA adds Google Chromium, DrayTek routers, and SAP NetWeaver flaws to its Known Exploited Vulnerabilities catalog
17
May
2025

U.S. CISA adds Google Chromium, DrayTek routers, and SAP NetWeaver flaws to its Known Exploited Vulnerabilities catalog

U.S. CISA adds Google Chromium, DrayTek routers, and SAP NetWeaver flaws to its Known Exploited Vulnerabilities catalog Pierluigi Paganini May…

Cloud Security Essentials - Protecting Multi-Cloud Environments
17
May
2025

Cloud Security Essentials – Protecting Multi-Cloud Environments

As organizations increasingly adopt multi-cloud environments to leverage flexibility, scalability, and cost-efficiency, securing these complex infrastructures has become a top…

Securing Generative AI - Mitigating Data Leakage Risks
17
May
2025

Securing Generative AI – Mitigating Data Leakage Risks

Generative artificial intelligence (GenAI) has emerged as a transformative force across industries, enabling content creation, data analysis, and decision-making breakthroughs….

Jane Devry
17
May
2025

Beyond the hype: The hidden security risks of AI agents and MCP

As AI rapidly evolves from a novelty to a necessity, businesses across every industry are feeling the pressure to integrate…

VMware ESXi, Firefox, Red Hat Linux & SharePoint 0-Day Vulnerabilities Exploited
17
May
2025

VMware ESXi, Firefox, Red Hat Linux & SharePoint 0-Day Vulnerabilities Exploited

Security researchers uncovered critical zero-day vulnerabilities across major enterprise platforms during the second day of Pwn2Own Berlin 2025, earning a…

APT Group 123 Actively Attacking Windows Systems to Deliver Malicious Payloads
17
May
2025

APT Group 123 Actively Attacking Windows Systems to Deliver Malicious Payloads

North Korean state-sponsored threat actor APT Group 123 has intensified its cyber espionage campaign, specifically targeting Windows systems across multiple…