Critical Linux Kernel Flaw (CVE-2025-21756) Allows Privilege Escalation
29
Apr
2025

Critical Linux Kernel Flaw (CVE-2025-21756) Allows Privilege Escalation

A newly disclosed vulnerability in the Linux kernel, tracked as CVE-2025-21756 and dubbed “Attack of the Vsock,” has sent ripples through the…

Naveen Goud
29
Apr
2025

What is Slopsquatting and is it a New Emerging Cyber Threat?

In the ever-evolving landscape of cybersecurity, new types of threats are constantly emerging. One relatively new tactic that has been…

DDoS attacks jump 358% compared to last year
29
Apr
2025

DDoS attacks jump 358% compared to last year

Cloudflare says it mitigated 20.5 million DDoS attacks in the first quarter of 2025. This is a 358% increase compared…

Malware Attack Targets World Uyghur Congress Leaders via Trojanized UyghurEdit++ Tool
29
Apr
2025

Malware Attack Targets World Uyghur Congress Leaders via Trojanized UyghurEdit++ Tool

Apr 29, 2025Ravie LakshmananCybersecurity / Malware In a new campaign detected in March 2025, senior members of the World Uyghur…

Cybersecurity in Malaysia
29
Apr
2025

2024 Cyberattacks Shook Malaysia—Now What?

By Salleh Kodri, SE Regional Manager, Cyble 2024 wasn’t just another year in Malaysia’s digital journey — it was a wake-up…

Apache Tomcat Vulnerability Let Bypass Rules & Trigger DoS Condition
29
Apr
2025

Apache Tomcat Vulnerability Let Bypass Rules & Trigger DoS Condition

The Apache Software Foundation disclosed a significant security vulnerability in Apache Tomcat that could allow attackers to bypass security rules…

4,800+ IPs Used to Target Git Configuration Files
29
Apr
2025

4,800+ IPs Used to Target Git Configuration Files

A recent surge in cyber reconnaissance has put thousands of organizations at risk after GreyNoise, a global threat intelligence platform,…

Jane Devry
29
Apr
2025

Behavioural economics of enterprise password management

When someone asks how you start a typical weekday, your answer likely includes the usual suspects, be it waking up,…

What's worth automating in cyber hygiene, and what's not
29
Apr
2025

What’s worth automating in cyber hygiene, and what’s not

Cyber hygiene sounds simple. Patch your systems, remove old accounts, update your software. But for large organizations, this gets messy…

CISA Adds Broadcom Brocade Fabric OS Flaw to Known Exploited Vulnerabilities List
29
Apr
2025

CISA Adds Broadcom Brocade Fabric OS Flaw to Known Exploited Vulnerabilities List

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent security advisory after adding a critical Broadcom Brocade…

Naveen Goud
29
Apr
2025

Akira Ransomware attack on Hitachi Vantara Servers

Hitachi Vantara, the global technology powerhouse and a subsidiary of Japan-based Hitachi, was targeted by the notorious Akira Ransomware gang…

Want faster products and stronger trust? Build security in, not bolt it on
29
Apr
2025

Want faster products and stronger trust? Build security in, not bolt it on

In this Help Net Security interview, Christopher Kennedy, CISO at Group 1001, discusses how cybersecurity initiatives are reshaping enterprise cybersecurity…