Dell still tops the pile as it deepens enterprise storage offer
05
Mar
2025

Dell still tops the pile as it deepens enterprise storage offer

In this storage supplier profile, we look at Dell storage, which is part of the infrastructure solutions group of the Texas-based…

Cisco Webex for BroadWorks Flaw Opens Door for Attackers to Access Credentials
05
Mar
2025

Cisco Webex for BroadWorks Flaw Opens Door for Attackers to Access Credentials

Cisco Systems has disclosed a security vulnerability in its Webex for BroadWorks unified communications platform that could allow attackers to…

patched Android chip
05
Mar
2025

Android zero-day vulnerabilities actively abused. Update as soon as you can

Google has issued updates to fix 43 vulnerabilities in Android, including two zero-days that are being actively exploited in targeted…

Chinese APT Lotus Panda
05
Mar
2025

Chinese APT Lotus Panda Targets Governments With New Sagerunex Backdoor Variants

Mar 05, 2025Ravie LakshmananCyber Espionage / Network Security The threat actor known as Lotus Panda has been observed targeting government,…

Known Exploited Vulnerabilities Catalog
05
Mar
2025

CISA Updates Known Exploited Vulnerabilities Catalog

The Cybersecurity and Infrastructure Security Agency (CISA) has recently updated its Known Exploited Vulnerabilities (KEV) Catalog with four new vulnerabilities,…

Over 10,000 WordPress Sites Exposed by Donation Plugin Code Execution Vulnerability
05
Mar
2025

Over 10,000 WordPress Sites Exposed by Donation Plugin Code Execution Vulnerability

A critical security flaw in the widely used GiveWP – Donation Plugin and Fundraising Platform has left over 10,000 WordPress websites vulnerable…

MDC
05
Mar
2025

MDC Activates Incident Response Team For Security Threat

The Missouri Department of Conservation (MDC), responsible for managing Missouri’s natural resources, recently discovered suspicious activity on one of its…

1 Million Third-Party Android Devices Have a Secret Backdoor for Scammers
05
Mar
2025

1 Million Third-Party Android Devices Have a Secret Backdoor for Scammers

Researchers from multiple firms say that the campaign seems to come from a loosely connected ecosystem of fraud groups rather…

U.S. Cracks Down on Nemesis Darknet Admin with New Treasury Sanctions
05
Mar
2025

U.S. Cracks Down on Nemesis Darknet Admin with New Treasury Sanctions

The U.S. Department of the Treasury has intensified its global campaign against darknet-facilitated drug trafficking by sanctioning Behrouz Parsarad, the…

Hackers Exploit Cloud Misconfigurations to Spread Malware
05
Mar
2025

Hackers Exploit Cloud Misconfigurations to Spread Malware

Veriti Research reveals 40% of networks allow ‘any/any’ cloud access, exposing critical vulnerabilities. Learn how malware like XWorm and Sliver…

Telegram EvilVideo Vulnerability Exploited to Run Malicious Code on Victims’ Devices
05
Mar
2025

Telegram EvilVideo Vulnerability Exploited to Run Malicious Code on Victims’ Devices

A newly documented exploitation technique targeting Telegram’s file-sharing infrastructure has raised alarms in cybersecurity circles. Dubbed “EvilVideo,” this attack vector…

LinkedIn Phishing Scam: Fake InMail Messages Spreading ConnectWise Trojan
05
Mar
2025

Fake InMail Messages Spreading ConnectWise Trojan

Cofense uncovers new LinkedIn phishing scam delivering ConnectWise RAT. Learn how attackers bypass security with fake InMail emails and how…