China Claims U.S. Cyberattack Targeted Leading Encryption Company
28
Apr
2025

China Claims U.S. Cyberattack Targeted Leading Encryption Company

China has accused U.S. intelligence agencies of carrying out a sophisticated cyberattack against one of its foremost commercial cryptography providers,…

JokerOTP Dismantled After 28,000 Phishing Attacks, 2 Arrested
28
Apr
2025

JokerOTP Dismantled After 28,000 Phishing Attacks, 2 Arrested

Two individuals have been arrested in a joint international operation dismantling JokerOTP, a sophisticated phishing tool used to intercept 2FA…

Breaking Down 5 Real Vulns
28
Apr
2025

Breaking Down 5 Real Vulns

Not every security vulnerability is high risk on its own – but in the hands of an advanced attacker, even…

Workers need more support for AI success
28
Apr
2025

Workers need more support for AI success

The UK could save £200bn if the workforce adopts artificial intelligence (AI) to improve productivity. That is the headline finding…

Car Subscription Features Raise Your Risk of Government Surveillance, Police Records Show
28
Apr
2025

Car Subscription Features Raise Your Risk of Government Surveillance, Police Records Show

What is also clear from the documents is that US police are aware of the control corporations have over their…

New iOS Vulnerability Could Brick iPhones with Just One Line of Code
28
Apr
2025

New iOS Vulnerability Could Brick iPhones with Just One Line of Code

A security researcher has uncovered a critical vulnerability in iOS, Apple’s flagship mobile operating system. The flaw, CVE-2025-24091, which leverages…

PoC rootkit Curing evades traditional Linux detection systems
28
Apr
2025

PoC rootkit Curing evades traditional Linux detection systems

PoC rootkit Curing evades traditional Linux detection systems Pierluigi Paganini April 28, 2025 Researchers created a PoC rootkit called Curing…

CISA Alerts Users to Security Flaws in Planet Technology Network Products
28
Apr
2025

CISA Alerts Users to Security Flaws in Planet Technology Network Products

Why Application Security is Non-Negotiable The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application…

Critical SAP NetWeaver flaw exploited by suspected initial access broker (CVE-2025-31324)
28
Apr
2025

Critical SAP NetWeaver flaw exploited by suspected initial access broker (CVE-2025-31324)

CVE-2025-31324, a critical vulnerability in the SAP NetWeaver platform, is being actively exploited by attackers to upload malicious webshells to…

Rootkits and Cloud-Based Data T
28
Apr
2025

Earth Kurma Targets Southeast Asia With Rootkits and Cloud-Based Data Theft Tools

Government and telecommunications sectors in Southeast Asia have become the target of a “sophisticated” campaign undertaken by a new advanced…

Attackers chained Craft CMS zero-days attacks in the wild
28
Apr
2025

Attackers chained Craft CMS zero-days attacks in the wild

Attackers chained Craft CMS zero-days attacks in the wild Pierluigi Paganini April 28, 2025 Orange Cyberdefense’s CSIRT reported that threat…

Viasat Modems Zero-Day Vulnerabilities Let Attackers Execute Remote Code
28
Apr
2025

Viasat Modems Zero-Day Vulnerabilities Let Attackers Execute Remote Code

A severe zero-day vulnerability has been uncovered in multiple Viasat satellite modem models, including the RM4100, RM4200, EM4100, RM5110, RM5111,…