INTERPOL Dismantles 20,000+ Malicious IPs Linked to 69 Malware Variants in Operation Secure
11
Jun
2025

INTERPOL Dismantles 20,000+ Malicious IPs Linked to 69 Malware Variants in Operation Secure

Jun 11, 2025Ravie LakshmananCybercrime / Malware INTERPOL on Wednesday announced the dismantling of more than 20,000 malicious IP addresses or…

Investor behaviour in the wake of cyber's 'black swan' moment
11
Jun
2025

Investor behaviour in the wake of cyber’s ‘black swan’ moment

A growing sense of uncertainty is taking hold as the UK faces two compounding pressures. On one hand, prolonged international…

critical exploit found after a decade
11
Jun
2025

Over 80,000 servers hit as roundcube RCE bug gets rapidly exploited

Over 80,000 servers hit as Roundcube RCE bug gets rapidly exploited Pierluigi Paganini June 11, 2025 A critical remote code…

HPE Aruba Network Vulnerability Exposes Sensitive Information to Hackers
11
Jun
2025

HPE Aruba Network Vulnerability Exposes Sensitive Information to Hackers

A high-severity security vulnerability in Hewlett Packard Enterprise (HPE) Aruba Networking Private 5G Core platform that could allow unauthorized actors…

11
Jun
2025

Microsoft fixes zero-day exploited for cyber espionage (CVE-2025-33053)

For June 2025 Patch Tuesday, Microsoft has fixed 66 new CVEs, including a zero-day exploited in the wild (CVE-2025-33053). Also,…

5 Lessons from River Island
11
Jun
2025

5 Lessons from River Island

In today’s security landscape, budgets are tight, attack surfaces are sprawling, and new threats emerge daily. Maintaining a strong security…

UK government recommits to Edinburgh supercomputer plan with £750m funding pledge
11
Jun
2025

UK government recommits to Edinburgh supercomputer plan with £750m funding pledge

Chancellor Rachel Reeves has committed up to £750m in funding to create the UK’s most powerful supercomputer at the University…

How to Detect and Mitigate Insider Threats in Your Organization
11
Jun
2025

How to Detect and Mitigate Insider Threats in Your Organization

Insider threats represent one of the most challenging cybersecurity risks facing modern organizations, with research indicating that insider data leaks…

Apache CloudStack Flaw Allows Attackers to Execute Privileged Actions
11
Jun
2025

Apache CloudStack Flaw Allows Attackers to Execute Privileged Actions

Apache CloudStack, a leading open-source cloud management platform, has announced the immediate availability of new Long-Term Support (LTS) releases—version 4.19.3.0…

SinoTrack GPS Devices Vulnerable to Remote Vehicle Control via Default Passwords
11
Jun
2025

SinoTrack GPS Devices Vulnerable to Remote Vehicle Control via Default Passwords

Jun 11, 2025Ravie LakshmananIoT Security / Vulnerability Two security vulnerabilities have been disclosed in SinoTrack GPS devices that could be…

Microsoft Defender XDR New Advanced Hunting Tables for Email and Cloud Protections
11
Jun
2025

Microsoft Defender XDR New Advanced Hunting Tables for Email and Cloud Protections

Microsoft has announced the introduction of two powerful new data tables to its Defender XDR advanced hunting capabilities, marking a…

Microsoft Teams New Audit log Feature Allows Admins to Track Individuals Actions
11
Jun
2025

Microsoft Teams New Audit log Feature Allows Admins to Track Individuals Actions

Microsoft is set to revolutionize enterprise security monitoring with comprehensive audit logging capabilities for screen sharing and control features in…