NCSC proposes three-step plan to move to quantum-safe encryption
20
Mar
2025

NCSC proposes three-step plan to move to quantum-safe encryption

The UK’s National Cyber Security Centre (NCSC) has published extensive new guidance to help support organisations as they prepare for…

Microsoft
20
Mar
2025

Nation-state groups hit hundreds of organizations with Microsoft Windows zero-day

Cybercriminals working on behalf of at least six nation-states are actively exploiting a zero-day vulnerability in Microsoft Windows to commit…

HellCat hackers focus on breaching Jira servers worldwide
20
Mar
2025

HellCat hackers go on a worldwide Jira hacking spree

Swiss global solutions provider Ascom has confirmed a cyberattack on its IT infrastructure as a hacker group known as Hellcat…

Hackers Exploiting Multiple Cisco Smart Licensing Utility Vulnerability 
20
Mar
2025

Hackers Exploiting Multiple Cisco Smart Licensing Utility Vulnerability 

Researchers have detected active exploitation attempts targeting two critical vulnerabilities in Cisco’s Smart Licensing Utility that were patched approximately six…

Dragon RaaS Leading “Five Families” Crimeware with New Initial Access & Exploitation Tactics
20
Mar
2025

Dragon RaaS Leading “Five Families” Crimeware with New Initial Access & Exploitation Tactics

Dragon RaaS, a ransomware group known for its blend of hacktivism and cybercrime, has emerged as a significant player in…

Veeam and IBM
20
Mar
2025

Veeam and IBM Release Patches for High-Risk Flaws in Backup and AIX Systems

Mar 20, 2025Ravie LakshmananVulnerability / Software Update Veeam has released security updates to address a critical security flaw impacting its…

Hyperscale datacentre capacities continue to rise off back of AI boom
20
Mar
2025

Hyperscale datacentre capacities continue to rise off back of AI boom

Hyperscale datacentres are increasing in capacity faster than number as operators push to meet the growing demand for compute capacity…

U.S. CISA adds Edimax IC-7100 IP Camera, NAKIVO, and SAP NetWeaver AS Java flaws to its Known Exploited Vulnerabilities catalog
20
Mar
2025

U.S. CISA adds Edimax IC-7100 IP Camera, NAKIVO, and SAP NetWeaver AS Java flaws to its Known Exploited Vulnerabilities catalog

U.S. CISA adds Edimax IC-7100 IP Camera, NAKIVO, and SAP NetWeaver AS Java flaws to its Known Exploited Vulnerabilities catalog Pierluigi…

New Steganographic Malware Exploits JPEG Files to Distribute Infostealers
20
Mar
2025

New Steganographic Malware Exploits JPEG Files to Distribute Infostealers

A sophisticated malware campaign employing steganographic techniques has recently been identified, targeting users through seemingly innocent JPEG image files. The…

AI-Powered Cyber Attacks and Data Privacy in The Age of Big Data
20
Mar
2025

AI-Powered Cyber Attacks and Data Privacy in The Age of Big Data

The fast transformation and evolution of artificial intelligence (AI) significantly changed the general norm and operational process of industries. This…

Zero-Hour Phishing Attacks Exploiting Browser Vulnerabilities Surge by 130%
20
Mar
2025

Zero-Hour Phishing Attacks Exploiting Browser Vulnerabilities Surge by 130%

Menlo Security, a leader in Secure Enterprise Browsers, has released its annual State of Browser Security Report, revealing a sharp…

More Than Half Of Ransomware Attacks Bypass Traditional Detection Tools
20
Mar
2025

More Than Half Of Ransomware Attacks Bypass Traditional Detection Tools

20 Mar More Than Half Of Ransomware Attacks Bypass Traditional Detection Tools Posted at 09:11h in Blogs by Taylor Fox…