Specops OT Environment
04
Dec
2025

How strong password policies secure OT systems against cyber threats

Operational technology (OT) interacts with crucial real-world infrastructure, empowering everything from energy plants to manufacturing facilities. Such environments are obvious…

CISA Warns of OpenPLC ScadaBR File Upload Vulnerability Exploited in Attacks
04
Dec
2025

CISA Warns of OpenPLC ScadaBR File Upload Vulnerability Exploited in Attacks

Critical vulnerability has been added to CISA’s Known Exploited Vulnerabilities list, warning organizations about a dangerous file-upload flaw in OpenPLC…

Hackers Weaponize Velociraptor DFIR for Stealthy C2 and Ransomware Deployment
04
Dec
2025

Hackers Weaponize Velociraptor DFIR for Stealthy C2 and Ransomware Deployment

Threat actors are increasingly weaponizing Velociraptor, a legitimate open-source digital forensics and incident response (DFIR) tool, to establish command-and-control (C2)…

Lawmakers question White House on strategy for countering AI-fueled hacks
04
Dec
2025

Lawmakers question White House on strategy for countering AI-fueled hacks

Listen to the article 3 min This audio is auto-generated. Please let us know if you have feedback. A pair…

Critical React, Next.js flaw lets hackers execute code on servers
04
Dec
2025

Critical React, Next.js flaw lets hackers execute code on servers

A maximum severity vulnerability, dubbed ‘React2Shell’, in the React Server Components (RSC) ‘Flight’ protocol allows remote code execution without authentication in React and…

New Phishing Attack Mimic as Income Tax Department of India Delivers AsyncRAT
04
Dec
2025

New Phishing Attack Mimic as Income Tax Department of India Delivers AsyncRAT

A comprehensive phishing operation began targeting Indian companies in November 2025 by impersonating the Income Tax Department of India. The…

Akamai Fixes HTTP Request Smuggling Flaw in Edge Servers
04
Dec
2025

Akamai Fixes HTTP Request Smuggling Flaw in Edge Servers

Akamai has fixed a vulnerability in its edge servers that could have allowed HTTP Request Smuggling attacks. The issue was…

Cybersecurity in Agentic Commerce: Safeguarding the Autonomous Future
04
Dec
2025

Cybersecurity in Agentic Commerce: Safeguarding the Autonomous Future

04 Dec Cybersecurity in Agentic Commerce: Safeguarding the Autonomous Future Posted at 09:43h in Blogs by Taylor Fox Building a…

Malicious Rust packages targeted Web3 developers
04
Dec
2025

Malicious Rust packages targeted Web3 developers

A malicious Rust crate (package) named evm-units, aimed at stealing cryptocurrency from unsuspecting developers, has been pulled from the official…

facial recognition
04
Dec
2025

Canadian police trialing facial recognition bodycams

A municipal police force in Canada is now using facial recognition bodycams, it was revealed this week. The police service…

Home Office launches police facial recognition consultation
04
Dec
2025

Home Office launches police facial recognition consultation

The Home Office has formally opened a consultation on the use of facial recognition by UK police, saying the government…

Five-page draft Trump administration cyber strategy targeted for January release
04
Dec
2025

Five-page draft Trump administration cyber strategy targeted for January release

The Trump administration is aiming to release its six-part national cybersecurity strategy in January, according to multiple sources familiar with…