Microsoft Teams Guest Chat Flaw Could Let Hackers Deliver Malware
27
Nov
2025

Microsoft Teams Guest Chat Flaw Could Let Hackers Deliver Malware

Security researchers have discovered a critical vulnerability in Microsoft Teams that allows attackers to bypass all Defender for Office 365…

ATA makes board chief executive-level club in bid for clout
27
Nov
2025

ATA makes board chief executive-level club in bid for clout

The telco industry lobby has moved to project more authority and boost its influence by retiring its board to replacing…

Gitlab Patches Multiple Vulnerabilities that Enable Authentication Bypass and DoS Attacks
27
Nov
2025

Gitlab Patches Multiple Vulnerabilities that Enable Authentication Bypass and DoS Attacks

GitLab has released critical security updates for its Community Edition (CE) and Enterprise Edition (EE) to address multiple high-severity vulnerabilities….

Legacy Python Package Vulnerabilities Enable PyPI Attacks Through Domain Takeover
27
Nov
2025

Legacy Python Package Vulnerabilities Enable PyPI Attacks Through Domain Takeover

ReversingLabs researchers have sounded the alarm over a vulnerability lurking in legacy Python packages one that exposes users of the…

Poland Arrests Russian Suspected Of Hacking E-Commerce Databases Across Europe
27
Nov
2025

Poland Arrests Russian Suspected Of Hacking E-Commerce Databases Across Europe

Polish authorities arrested a 23-year-old Russian citizen on November 16, after investigators linked him to unauthorized intrusions into e-commerce platforms,…

Asahi aims to restore logistics by February following cyberattack
27
Nov
2025

Asahi aims to restore logistics by February following cyberattack

Japan’s Asahi Group aims to normalise logistical operations by February next year after a cyberattack in late September forced widespread…

Over 390 Abandoned iCalendar Sync Domains Could Expose ~4 Million Devices to Security Risks
27
Nov
2025

Over 390 Abandoned iCalendar Sync Domains Could Expose ~4 Million Devices to Security Risks

Digital calendars have become indispensable tools for managing personal and professional schedules. Users frequently subscribe to external calendars for public…

Lapsus$ Hunters Register 40+ Domains Impersonating Zendesk Environments
27
Nov
2025

Lapsus$ Hunters Register 40+ Domains Impersonating Zendesk Environments

ReliaQuest’s Threat Research team has uncovered a significant new campaign from the notorious threat collective “Scattered Lapsus$ Hunters,” this time…

Bloody Wolf Expands Java-based NetSupport RAT Attacks in Kyrgyzstan and Uzbekistan
27
Nov
2025

Bloody Wolf Expands Java-based NetSupport RAT Attacks in Kyrgyzstan and Uzbekistan

Nov 27, 2025Ravie LakshmananMalware / Social Engineering The threat actor known as Bloody Wolf has been attributed to a cyber…

Child Sexual Abuse
27
Nov
2025

EU Reaches Agreement On Child Sexual Abuse Detection Law After Three Years Of Contentious Debate

That lengthy standoff over privacy rights versus child protection ended Wednesday when EU member states finally agreed on a negotiating…

NVIDIA DGX Spark Vulnerabilities Let Attackers Execute Malicious Code and DoS Attacks
27
Nov
2025

NVIDIA DGX Spark Vulnerabilities Let Attackers Execute Malicious Code and DoS Attacks

An urgent security update for its DGX Spark AI workstation after discovering 14 vulnerabilities in the system’s firmware that could…

Quttera Launches "Evidence-as-Code" API to Automate Security Compliance for SOC 2 and PCI DSS v4.0
27
Nov
2025

Quttera Launches “Evidence-as-Code” API to Automate Security Compliance for SOC 2 and PCI DSS v4.0

New API capabilities and AI-powered Threat Encyclopedia eliminate manual audit preparation, providing real-time compliance evidence and instant threat intelligence Quttera…