US Charges 12 Alleged Spies in China's Freewheeling Hacker-for-Hire Ecosystem
05
Mar
2025

US Charges 12 Alleged Spies in China’s Freewheeling Hacker-for-Hire Ecosystem

Only rarely does the West get a glimpse inside the vast hacker-for-hire contractor ecosystem that enables China’s digital intrusion campaigns…

Vim Vulnerability (CVE-2025-27423) Allows Code Execution via Malicious TAR Archives
05
Mar
2025

Vim Vulnerability (CVE-2025-27423) Allows Code Execution via Malicious TAR Archives

A high-severity security flaw in the widely used Vim text editor allows attackers to execute arbitrary code on vulnerable systems…

Chinese Silk Typhoon Group Targets IT Tools for Network Breaches
05
Mar
2025

Chinese Silk Typhoon Group Targets IT Tools for Network Breaches

Cybersecurity researchers at Microsoft Threat Intelligence have observed that Silk Typhoon aka HAFNIUM, a Chinese espionage group known for its…

IR35: Government outlines two-pronged approach to umbrella company regulation
05
Mar
2025

IR35: Government outlines two-pronged approach to umbrella company regulation

The government has concluded its long-running consultation into stamping out tax and employment rights non-compliance by umbrella companies, meaning the…

Broadcom urges customers to patch 3 zero-day VMware flaws
05
Mar
2025

Broadcom urges customers to patch 3 zero-day VMware flaws

Broadcom is giving its VMware customers some all-too-familiar advice once again: Install updates to patch vulnerabilities in VMware offerings, this time…

Android
05
Mar
2025

BadBox malware disrupted on 500K infected Android devices

The BadBox Android malware botnet has been disrupted again by removing 24 malicious apps from Google Play and sinkholing communications…

Cybercriminals Impersonate Electronic Frontier Foundation to Target Gaming Community
05
Mar
2025

Cybercriminals Impersonate Electronic Frontier Foundation to Target Gaming Community

A sophisticated phishing campaign targeting the Albion Online gaming community has been uncovered, revealing a complex operation involving impersonation of…

Google Rolls Out AI Scam Detection for Android to Combat Conversational Fraud
05
Mar
2025

Google Rolls Out AI Scam Detection for Android to Combat Conversational Fraud

Mar 05, 2025Ravie LakshmananMobile Security / Artificial Intelligence Google has announced the rollout of artificial intelligence (AI)-powered scam detection features…

French oceanographers clock up 23 years on Atempo backup software
05
Mar
2025

French oceanographers clock up 23 years on Atempo backup software

Tina Ifremer sounds like the latest R&B singer you’ve never heard of. But, actually, it’s the name given to the…

Hunters International ransomware group claims the theft of 1.4 TB of data allegedly stolen from Tata Technologies
05
Mar
2025

Hunters International ransomware group claims the theft of 1.4 TB of data allegedly stolen from Tata Technologies

Hunters International gang claims the theft of 1.4 TB of data allegedly stolen from Tata Technologies Pierluigi Paganini March 05,…

Drones in the sky
05
Mar
2025

Look up: The new frontier of cyberthreats is in the sky

With increased unidentified drone sightings worldwide, some are concerned they pose a cybersecurity risk. Learn more from Acronis about these…

North Korean IT Workers Exploit GitHub to Launch Global Cyber Attacks
05
Mar
2025

North Korean IT Workers Exploit GitHub to Launch Global Cyber Attacks

A network of suspected North Korean IT workers is using GitHub to create and backstop fake personas, aiming to infiltrate…