Gov.uk One Login yet to meet government cyber security standards for critical public services
12
Jun
2025

MPs to investigate potential for government digital identity scheme

MPs are to investigate the risks and opportunities of digital identity in the UK, as Labour influencers increasingly call for…

Windows 11
12
Jun
2025

Windows 11 24H2 emergency update fixes Easy Anti-Cheat BSOD issue

Microsoft has released an emergency Windows 11 24H2 update to address an incompatibility issue triggering restarts with blue screen of death…

PAN-OS Vulnerability Let Attacker Run Arbitrary Commands as Root User
12
Jun
2025

PAN-OS Vulnerability Let Attacker Run Arbitrary Commands as Root User

A newly disclosed command injection vulnerability in Palo Alto Networks’ PAN-OS operating system poses significant security risks to enterprise firewall…

Cybercriminals Advertise Advanced MaaS Botnet with Blockchain C2 on Hacking Forums
12
Jun
2025

Cybercriminals Advertise Advanced MaaS Botnet with Blockchain C2 on Hacking Forums

Cybersecurity researchers have uncovered the alleged sale of a sophisticated Malware-as-a-Service (MaaS) botnet that combines legitimate development frameworks with cutting-edge…

US Tops List of Unsecured Cameras Exposing Homes and Offices
12
Jun
2025

US Tops List of Unsecured Cameras Exposing Homes and Offices

A new study by BitSight TRACE shows that over 40,000 security cameras connected to the internet are openly available for…

Windows SMB Client Zero-Day Vulnerability Exploited Using Reflective Kerberos Relay Attack
12
Jun
2025

Windows SMB Client Zero-Day Vulnerability Exploited Using Reflective Kerberos Relay Attack

A critical zero-day vulnerability affecting Windows systems that allows attackers to achieve privilege escalation through a novel Reflective Kerberos Relay…

Hackers Launch Coordinated Attack on Apache Tomcat Manager from 400 Unique IPs
12
Jun
2025

Hackers Launch Coordinated Attack on Apache Tomcat Manager from 400 Unique IPs

Cybersecurity researchers at GreyNoise Intelligence have identified a significant coordinated attack campaign targeting Apache Tomcat Manager interfaces across the globe….

8 use cases for generative AI in manufacturing
12
Jun
2025

8 use cases for generative AI in manufacturing

In recent years, manufacturing has dramatically modernized, particularly with the implementation of new tools such as generative AI. Contemporary production…

Fog ransomware attack uses unusual mix of legitimate and open-source tools
12
Jun
2025

Fog ransomware attack uses unusual mix of legitimate and open-source tools

Fog ransomware hackers are using an uncommon toolset, which includes open-source pentesting utilities and a legitimate employee monitoring software called Syteca. The…

New Campaign Targets Entra ID User Accounts Using Pentesting Tool for Account Takeover
12
Jun
2025

New Campaign Targets Entra ID User Accounts Using Pentesting Tool for Account Takeover

Proofpoint Threat Intelligence has uncovered a large-scale Account Takeover (ATO) campaign, internally tracked as UNK_SneakyStrike, that leverages the open-source penetration…

Agentforce London: 78% of UK companies use agentic AI, says Salesforce
12
Jun
2025

Agentforce London: 78% of UK companies use agentic AI, says Salesforce

Salesforce has released survey data that says 78% of UK organisations are using agentic artificial intelligence (AI). The findings, provided…

CISA Releases Guide to Protect Network Edge Devices From Hackers
12
Jun
2025

CISA Releases Guide to Protect Network Edge Devices From Hackers

CISA and international cybersecurity partners have released a comprehensive suite of guidance documents aimed at protecting critical network edge devices…