How to Stop Infostealers and Next-Gen Ransomware with an Identity-Centric Security Approach
12
Jun
2025

How to Stop Infostealers and Next-Gen Ransomware with an Identity-Centric Security Approach

Ransomware is the leading cybersecurity threat across every industry and a top priority for every Security Operations Center (SOC) team…

New Secure Boot Vulnerability Allows Attackers to Install Malware in PC and Server Boot Processes
12
Jun
2025

New Secure Boot Vulnerability Allows Attackers to Install Malware in PC and Server Boot Processes

Security researchers from Binarly have uncovered a major software vulnerability in the Unified Extensible Firmware Interface (UEFI) ecosystem, specifically impacting…

CISA Warns of Serious Remote Control Risks in SinoTrack Vehicle Trackers
12
Jun
2025

CISA Warns of Remote Control Flaws in SinoTrack GPS Trackers

Owners of SinoTrack GPS devices should be aware of significant security weaknesses that could allow unauthorized individuals to track vehicles…

Curtin University makes headway on 'radical' tech shakeup
12
Jun
2025

Curtin University makes headway on ‘radical’ tech shakeup

Curtin University has completed the first phase of a multi-year IT transformation, decommissioning its legacy infrastructure and building and building…

Microsoft Office Vulnerabilities Let Attackers Execute Remote Code
11
Jun
2025

Microsoft Office Vulnerabilities Let Attackers Execute Remote Code

Multiple critical vulnerabilities in Microsoft Office could allow attackers to execute arbitrary code on affected systems.  The vulnerabilities, tracked as…

How To Strengthen the Security of Your Symfony-Based Solution
11
Jun
2025

How To Strengthen the Security of Your Symfony-Based Solution

Like all web-based solutions, applications built with Symfony are exposed to various cyber threats, and you should be ready to…

Over 40,000 Internet-Connected Cameras Exposed, Streaming Live Online
11
Jun
2025

Over 40,000 Internet-Connected Cameras Exposed, Streaming Live Online

Bitsight TRACE has uncovered more than 40,000 security cameras openly accessible on the internet—streaming live footage from homes, offices, factories,…

Windows Common Log File System Driver Vulnerability Let Attackers Escalate Privileges
11
Jun
2025

Windows Common Log File System Driver Vulnerability Let Attackers Escalate Privileges

A critical security vulnerability in the Windows Common Log File System Driver (CLFS) enables attackers to escalate their privileges to…

Interpol Dismantles 20,000 Malicious IPs and Domains Tied to 69 Malware Variants
11
Jun
2025

Interpol Dismantles 20,000 Malicious IPs and Domains Tied to 69 Malware Variants

INTERPOL’s Operation Secure has seen the takedown of more than 20,000 malicious IP addresses and domains associated with infostealer malware….

Authorities seized 41 servers during Operation Secure.
11
Jun
2025

Global law enforcement action in Asia nets large infrastructure seizure, 32 arrests

Authorities from 26 countries scored another win in the global crackdown on cybercrime earlier this year, chipping away at multiple…

Linux Malware Authors Attacking Cloud Environments Using ELF Binaries
11
Jun
2025

Linux Malware Authors Attacking Cloud Environments Using ELF Binaries

A sophisticated wave of Linux malware campaigns is targeting cloud environments with increasing frequency and complexity, posing significant threats to…

How to Use Risk Management to Strengthen Business Cybersecurity
11
Jun
2025

How to Use Risk Management to Strengthen Business Cybersecurity

Cybersecurity is a massive point of emphasis for most businesses in the modern age. You must work diligently to protect…