Sweden gets help pulling its sovereign AI socks up
12
Jun
2025

Sweden gets help pulling its sovereign AI socks up

Financiers picked up the pace of funding in artificial intelligence (AI) infrastructure in Sweden last month, after an urgent government…

U.S. CISA adds Google Chromium V8 flaw to its Known Exploited Vulnerabilities catalog
12
Jun
2025

SinoTrack GPS device flaws allow remote vehicle control and location tracking

SinoTrack GPS device flaws allow remote vehicle control and location tracking Pierluigi Paganini June 12, 2025 Two vulnerabilities in SinoTrack…

Trend Micro Apex One Vulnerability Allow Attackers to Inject Malicious Code
12
Jun
2025

Trend Micro Apex One Vulnerability Allow Attackers to Inject Malicious Code

Multiple critical security vulnerabilities in the Trend Micro Apex One enterprise security platform could enable attackers to inject malicious code and escalate…

Gov.uk One Login yet to meet government cyber security standards for critical public services
12
Jun
2025

MPs to investigate potential for government digital identity scheme

MPs are to investigate the risks and opportunities of digital identity in the UK, as Labour influencers increasingly call for…

Windows 11
12
Jun
2025

Windows 11 24H2 emergency update fixes Easy Anti-Cheat BSOD issue

Microsoft has released an emergency Windows 11 24H2 update to address an incompatibility issue triggering restarts with blue screen of death…

PAN-OS Vulnerability Let Attacker Run Arbitrary Commands as Root User
12
Jun
2025

PAN-OS Vulnerability Let Attacker Run Arbitrary Commands as Root User

A newly disclosed command injection vulnerability in Palo Alto Networks’ PAN-OS operating system poses significant security risks to enterprise firewall…

Cybercriminals Advertise Advanced MaaS Botnet with Blockchain C2 on Hacking Forums
12
Jun
2025

Cybercriminals Advertise Advanced MaaS Botnet with Blockchain C2 on Hacking Forums

Cybersecurity researchers have uncovered the alleged sale of a sophisticated Malware-as-a-Service (MaaS) botnet that combines legitimate development frameworks with cutting-edge…

US Tops List of Unsecured Cameras Exposing Homes and Offices
12
Jun
2025

US Tops List of Unsecured Cameras Exposing Homes and Offices

A new study by BitSight TRACE shows that over 40,000 security cameras connected to the internet are openly available for…

Windows SMB Client Zero-Day Vulnerability Exploited Using Reflective Kerberos Relay Attack
12
Jun
2025

Windows SMB Client Zero-Day Vulnerability Exploited Using Reflective Kerberos Relay Attack

A critical zero-day vulnerability affecting Windows systems that allows attackers to achieve privilege escalation through a novel Reflective Kerberos Relay…

Hackers Launch Coordinated Attack on Apache Tomcat Manager from 400 Unique IPs
12
Jun
2025

Hackers Launch Coordinated Attack on Apache Tomcat Manager from 400 Unique IPs

Cybersecurity researchers at GreyNoise Intelligence have identified a significant coordinated attack campaign targeting Apache Tomcat Manager interfaces across the globe….

8 use cases for generative AI in manufacturing
12
Jun
2025

8 use cases for generative AI in manufacturing

In recent years, manufacturing has dramatically modernized, particularly with the implementation of new tools such as generative AI. Contemporary production…

Fog ransomware attack uses unusual mix of legitimate and open-source tools
12
Jun
2025

Fog ransomware attack uses unusual mix of legitimate and open-source tools

Fog ransomware hackers are using an uncommon toolset, which includes open-source pentesting utilities and a legitimate employee monitoring software called Syteca. The…