Synology Network File System Vulnerability Let Read Any File
23
Apr
2025

Synology Network File System Vulnerability Let Read Any File

A severe security vulnerability in Synology’s DiskStation Manager (DSM) software has been identified. This vulnerability allows remote attackers to read…

Russian Hackers Exploit Microsoft OAuth 2.0 to Target Organizations
23
Apr
2025

Russian Hackers Exploit Microsoft OAuth 2.0 to Target Organizations

Cybersecurity firm Volexity has tracked a series of highly targeted attacks by suspected Russian threat actors, identified as UTA0352 and…

State Department reorganization could imperil cyber diplomacy
23
Apr
2025

State Department reorganization could imperil cyber diplomacy

The Trump administration’s plan to overhaul the State Department for the modern era could halt the U.S.’s recent progress on…

Push phishing attack header
23
Apr
2025

Why most attacks feel like a zero day

Phishing attacks remain a huge challenge for organizations in 2025. In fact, with attackers increasingly leveraging identity-based techniques over software…

Ripple XPRL Official NPM Package Hijacked To Inject Private Key Stealing Malware
23
Apr
2025

Ripple XPRL Official NPM Package Hijacked To Inject Private Key Stealing Malware

A significant supply chain attack targeting cryptocurrency users. The official XRPL (Ripple) NPM package, which serves as the JavaScript SDK…

New SMS Phishing Attack Weaponizes Google AMP Links to Evade Detection
23
Apr
2025

New SMS Phishing Attack Weaponizes Google AMP Links to Evade Detection

Group-IB’s High-Tech Crime Trends Report 2025 reveals a sharp 22% surge in phishing websites, with over 80,000 detected in 2024….

AI impact on data breach outcomes remains ‘limited’: Verizon
23
Apr
2025

AI impact on data breach outcomes remains ‘limited’: Verizon

Dive Brief: Despite fears, the recent waves of AI uptake have yet to require a cybersecurity overhaul, according to Verizon’s…

ASUS
23
Apr
2025

ASUS releases fix for AMI bug that lets hackers brick servers

ASUS has released security updates to address CVE-2024-54085, a maximum severity flaw that could allow attackers to hijack and potentially…

The Evolving Role of the CISO
23
Apr
2025

The Evolving Role of the CISO

The Evolving role of the Chief Information Security Officer (CISO) has transcended its roots in technical oversight to become a…

Ransomware Actors Ramp Up Attacks organizations with Emerging Extortion Trends
23
Apr
2025

Ransomware Actors Ramp Up Attacks organizations with Emerging Extortion Trends

Unit 42’s 2025 Global Incident Response Report, ransomware actors are intensifying their cyberattacks, with 86% of incidents causing significant business…

How to Clear iPhone Storage
23
Apr
2025

How to Clear iPhone Storage

If your iPhone feels cramped and storage alerts show up like it’s on a schedule, it’s probably time for a…

Blue Shield of California
23
Apr
2025

Blue Shield of California leaked health data of 4.7 million members to Google

Blue Shield of California disclosed it suffered a data breach after exposing protected health information of 4.7 million members to…