41,500+ VMware ESXi Instances Vulnerable to Code Execution Attacks
06
Mar
2025

41,500+ VMware ESXi Instances Vulnerable to Code Execution Attacks

Shadowserver observed that 41,500+ internet-exposed VMware ESXi hypervisors as of March 4, 2025, are vulnerable to CVE-2025-22224, a critical zero-day…

Google Unveils GoStringUngarbler to Crack Go-Based Malware Encryption
06
Mar
2025

Google Unveils GoStringUngarbler to Crack Go-Based Malware Encryption

Google’s FLARE team has released GoStringUngarbler, an open-source tool designed to dismantle string obfuscation in Go binaries protected by the garble…

89% of enterprise AI usage is invisible to the organization
06
Mar
2025

89% of enterprise AI usage is invisible to the organization

Organizations have zero visibility into 89% of AI usage, despite security policies according to a LayerX report. 71% of connections…

BadBox Malware from Google Play Hacked 50,000+ Android Devices Using 24 Apps
06
Mar
2025

BadBox Malware from Google Play Hacked 50,000+ Android Devices Using 24 Apps

HUMAN Security’s Satori Threat Intelligence team has uncovered a sophisticated malware operation dubbed “BADBOX 2.0” that compromised over 50,000 Android…

06
Mar
2025

Case study: NGM Group plots next steps for better agent experience – Emerging Tech

Newcastle Greater Mutual (NGM) Group plans to expand its AI capabilities in 2025, following a contact centre overhaul. The overhaul…

P&N Group takes
06
Mar
2025

P&N Group takes “conservative” AI approach for its customer and staff experience – Emerging Tech – Financial Services

P&N Group is taking a “conservative approach” to AI applications as it evaluates the potential introduction of AI-powered agents to…

Vim Editor Vulnerability Exploited Via TAR Files to Trigger Code Execution
06
Mar
2025

Vim Editor Vulnerability Exploited Via TAR Files to Trigger Code Execution

The Vim text editor vulnerability CVE-2025-27423 is a high-severity issue that allows for arbitrary code execution via malicious TAR archives….

Apple IPT appeal against “back door” encryption order is test case for bigger targets
06
Mar
2025

Apple IPT appeal against “back door” encryption order is test case for bigger targets

Apple has filed a legal appeal against a secret Home Office order to provide ‘back door’ access to its users…

Telegram Evilvideo Vulnerability Exploited to Execute Malicious Code
06
Mar
2025

Telegram Evilvideo Vulnerability Exploited to Execute Malicious Code

A critical evolution of the CVE-2024-7014 vulnerability, originally patched in July 2024, has resurfaced with updated tactics to bypass security…

Gov lays down procurement criteria for 'Australian businesses'
06
Mar
2025

Gov lays down procurement criteria for ‘Australian businesses’ – Cloud – Hardware – Software

The government has for the first time drawn up an official definition of an Australian business as part of new…

U.S Treasury Sanctions Admin of Nemesis Darknet Marketplace
06
Mar
2025

U.S Treasury Sanctions Admin of Nemesis Darknet Marketplace

The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) announced sweeping sanctions today against Behrouz Parsarad, an…

06
Mar
2025

Cloud transformation is complicating security compliance – for the better – Partner Content – Security

Regulators’ increasing focus on cybersecurity is forcing executives and board members to implement and demonstrate robust security practices – but…