Rat
17
Mar
2025

New RAT malware used for crypto theft, reconnaissance

​Microsoft has discovered a new remote access trojan (RAT) that employs “sophisticated techniques” to avoid detection, ensure persistence, and extract sensitive…

Supply Chain Attack Targets 23,000 GitHub Repositories
17
Mar
2025

Supply Chain Attack Targets 23,000 GitHub Repositories

A critical security incident has been uncovered involving the popular GitHub Action tj-actions/changed-files, which is used in over 23,000 repositories….

Online Safety Act measures come into effect
17
Mar
2025

Online Safety Act measures come into effect

Regulator Ofcom has begun enforcing its “illegal content” codes under the Online Safety Act (OSA) after the end of a…

Space Bears threat group
17
Mar
2025

Funny, Scary & Just Plain Weird

With thousands of threat groups trying to make a name for themselves and new ones cropping up every day, it…

Cryptocurrency
17
Mar
2025

OKX suspends DEX aggregator after Lazarus hackers try to launder funds

OKX Web3 has decided to suspend its DEX aggregator services to implement security upgrades following reports of abuse by the…

Hackers Rapidly Adopt ClickFix Technique for Sophisticated Attacks
17
Mar
2025

Hackers Rapidly Adopt ClickFix Technique for Sophisticated Attacks

In recent months, a sophisticated social engineering technique known as ClickFix has gained significant traction among cybercriminals and nation-state-sponsored groups….

Custom vs. Off-the-shelf Educational Software
17
Mar
2025

Custom vs. Off-the-shelf Educational Software

Educational institutions and businesses looking to implement technology-driven learning solutions often face a key decision: should they invest in custom-built…

Apache Tomcat Vulnerability
17
Mar
2025

Apache Tomcat Vulnerability Actively Exploited Just 30 Hours After Public Disclosure

Mar 17, 2025Ravie LakshmananVulnerability / Web Security A recently disclosed security flaw impacting Apache Tomcat has come under active exploitation…

Data protection and AI: what to know about new UK cyber standard
17
Mar
2025

Data protection and AI: what to know about new UK cyber standard

In a significant move positioning the UK at the forefront of responsible AI adoption, the government has introduced what it…

DOGE staffer violated security policies at Treasury Department, court filing shows
17
Mar
2025

DOGE staffer violated security policies at Treasury Department, court filing shows

A staffer for the Department of Government Efficiency (DOGE) violated security policies at the Treasury Department by improperly sharing sensitive…

Supply chain attack against GitHub Action triggers massive exposure of secrets
17
Mar
2025

Supply chain attack against GitHub Action triggers massive exposure of secrets

Security researchers are warning of a supply chain attack against tj-actions/changed-files GitHub Action, which is used in more than 23,000…

Attackers use CSS to create evasive phishing messages
17
Mar
2025

Attackers use CSS to create evasive phishing messages

Attackers use CSS to create evasive phishing messages Pierluigi Paganini March 17, 2025 Threat actors exploit Cascading Style Sheets (CSS)…