14
May
2025

Google strengthens secure enterprise access from BYOD Android devices

Google has introduced Device Trust from Android Enterprise, a new solution for making sure that private Android devices used for…

Enisa launches European vulnerability database
14
May
2025

Enisa launches European vulnerability database

The European Union Agency for Cybersecurity (Enisa) has debuted a European Union Vulnerability Database (EUVD) to provide “aggregated, reliable and…

UK retailer Co-op restoring systems following major cyberattack
14
May
2025

UK retailer Co-op restoring systems following major cyberattack

British food retailer Co-op Group said Wednesday it has reached the recovery phase following a major cyberattack and is restoring…

Steel giant Nucor Corporation facing disruptions after cyberattack
14
May
2025

Steel giant Nucor Corporation facing disruptions after cyberattack

A cybersecurity incident on Nucor Corporation’s systems, the largest steel producer in the U.S., forced the company to take offline parts of its…

Critical Adobe Illustrator Vulnerability Let Attackers Execute Malicious Code
14
May
2025

Critical Adobe Illustrator Vulnerability Let Attackers Execute Malicious Code

Adobe has released a critical security update for its popular design software Illustrator, addressing a severe vulnerability that could allow…

Threat Actors Leverage Weaponized HTML Files to Deliver Horabot Malware
14
May
2025

Threat Actors Leverage Weaponized HTML Files to Deliver Horabot Malware

A recent discovery by FortiGuard Labs has unveiled a cunning phishing campaign orchestrated by threat actors deploying Horabot malware, predominantly…

Naveen Goud
14
May
2025

The Evolving Nature of DDoS Attacks: A Smokescreen for More Dangerous Threats

For years, Distributed Denial of Service (DDoS) attacks have been one of the most common and disruptive tactics used by…

Why we must reform the Computer Misuse Act: A cyber pro speaks out
14
May
2025

Why we must reform the Computer Misuse Act: A cyber pro speaks out

Eight years ago, Simon Whittaker, head of cyber security at Belfast-based consultancy Instil, narrowly avoided having his front door smashed…

Congress faces pressure to renew cyber information-sharing law
14
May
2025

Congress faces pressure to renew cyber information-sharing law

Listen to the article 4 min This audio is auto-generated. Please let us know if you have feedback. A coalition…

Linux
14
May
2025

Microsoft fixes Linux boot issues on dual-boot Windows systems

Microsoft has fixed a known issue preventing Linux from booting on dual-boot systems with Secure Boot enabled after installing the August 2024…

Weaponized Google Calendar Invites Delivers Malicious Payload With Just One Character
14
May
2025

Weaponized Google Calendar Invites Delivers Malicious Payload With Just One Character

A new attack vector where cybercriminals are weaponizing Google Calendar invites to deliver malware, using a sophisticated obfuscation technique involving…

New Adobe Photoshop Vulnerability Enables Arbitrary Code Execution
14
May
2025

New Adobe Photoshop Vulnerability Enables Arbitrary Code Execution

Adobe has released critical security updates addressing three high-severity vulnerabilities (CVE-2025-30324, CVE-2025-30325, CVE-2025-30326) in Photoshop 2024 and 2025 that could…