Beyond the hook: How phishing is evolving in the world of AI
06
May
2025

Beyond the hook: How phishing is evolving in the world of AI

One almost feels a little nostalgic for the days of old-school phishing attacks, those poorly worded, spray-and-pray emails that most…

Google fixed actively exploited Android flaw CVE-2025-27363
06
May
2025

Google fixed actively exploited Android flaw CVE-2025-27363

Google fixed actively exploited Android flaw CVE-2025-27363 Pierluigi Paganini May 06, 2025 Google addressed 46 Android security vulnerabilities, including one…

CISA Warns of Langflow Missing Authentication Vulnerability Exploited in Attacks
06
May
2025

CISA Warns of Langflow Missing Authentication Vulnerability Exploited in Attacks

CISA has added a critical Langflow vulnerability to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in…

Hackers Exploit Fake Chrome Error Pages to Deploy Malicious Scripts on Windows Users
06
May
2025

Hackers Exploit Fake Chrome Error Pages to Deploy Malicious Scripts on Windows Users

Hackers are leveraging a sophisticated social engineering technique dubbed “ClickFix” to trick Windows users into executing malicious scripts on their…

Exploited: Vulnerability in software for managing Samsung digital displays (CVE-2024-7399)
06
May
2025

Exploited: Vulnerability in software for managing Samsung digital displays (CVE-2024-7399)

An easily and remotely exploitable vulnerability (CVE-2024-7399) affecting Samsung MagicINFO, a platform for managing content on Samsung commercial displays, is…

Interview: Joe Depa, global chief innovation officer, EY
06
May
2025

Interview: Joe Depa, global chief innovation officer, EY

As global chief innovation officer (CIO) at EY, Joe Depa helps his firm embrace new ideas that boost service delivery…

New 'Bring Your Own Installer (BYOI)' technique allows to bypass EDR
06
May
2025

New ‘Bring Your Own Installer (BYOI)’ technique allows to bypass EDR

New ‘Bring Your Own Installer (BYOI)’ technique allows to bypass EDR Pierluigi Paganini May 06, 2025 A new BYOI technique…

Destructive Linux malware hides in malicious Go modules on GitHub
06
May
2025

Linux wiper malware hidden in malicious Go modules on GitHub

A supply-chain attack targets Linux servers with disk-wiping malware hidden in Golang modules published on GitHub. The campaign was detected…

UDP Vulnerability in Windows Deployment Services Allows 0-Click System Crashes
06
May
2025

UDP Vulnerability in Windows Deployment Services Allows 0-Click System Crashes

A newly discovered vulnerability in Microsoft’s Windows Deployment Services (WDS) allows attackers to remotely crash servers with zero user interaction…

US Border Agents Are Asking for Help Taking Photos of Everyone Entering the Country by Car
06
May
2025

US Border Agents Are Asking for Help Taking Photos of Everyone Entering the Country by Car

United States Customs and Border Protection is asking tech companies to send pitches for a real-time facial recognition tool that…

New ClickFix Attack Imitates Ministry of Defence Website to Target Windows & Linux Systems
06
May
2025

New ClickFix Attack Imitates Ministry of Defence Website to Target Windows & Linux Systems

A newly identified cyberattack campaign has surfaced, leveraging the recognizable branding of India’s Ministry of Defence to distribute cross-platform malware…

Jane Devry
06
May
2025

Stealth Tunnels: The Dawn of Undetectable Remote Access

In today’s world, more employees work from home, coffee shops, or satellite offices than ever before. While remote access tools…