09
May
2025

New infosec products of the week: May 9, 2025

Here’s a look at the most interesting products from the past week, featuring releases from ProcessUnity, Searchlight Cyber, ServiceNow, and…

Google Rolls Out On-Device AI Protections to Detect Scams in Chrome and Android
09
May
2025

Google Rolls Out On-Device AI Protections to Detect Scams in Chrome and Android

May 09, 2025Ravie LakshmananArtificial Intelligence / Online Fraud Google on Thursday announced it’s rolling out new artificial intelligence (AI)-powered countermeasures…

TheMoon malware advisory
09
May
2025

FBI Warns Of TheMoon Malware Exploiting EOL Routers

The Federal Bureau of Investigation (FBI) has issued a warning about the TheMoon malware. The warning also stresses the dramatic…

FBI Warns Hackers Are Using End-of-Life Routers to Mask Their Tracks
09
May
2025

FBI Warns Hackers Are Using End-of-Life Routers to Mask Their Tracks

The Federal Bureau of Investigation (FBI) has issued a stark warning to businesses and home users: cybercriminals are actively exploiting…

09
May
2025

May 2025 Patch Tuesday forecast: Panic, change, and hope

April was an event-filled month for cybersecurity. Patch Tuesday came to us quickly on April 8 – the earliest first…

PowerSchool Data Breach
09
May
2025

PowerSchool Data Breach Leads To TDSB Extortion Threat

The Toronto District School Board (TDSB) has informed parents and staff of a renewed cyber threat following a major data…

Naveen Goud
09
May
2025

Cyber Insurance premiums set to rise as Retail Sector faces growing Cyber Threats

As cyberattacks on retailers in the United Kingdom continue to surge, insurers are rethinking how they approach cyber insurance for…

09
May
2025

Review: AI Agents in Action

If you’re trying to make sense of how to actually build AI agents, not just talk about them, AI Agents…

Azure Storage Utility Vulnerability Allows Privilege Escalation to Root Access
09
May
2025

Azure Storage Utility Vulnerability Allows Privilege Escalation to Root Access

A critical vulnerability discovered by Varonis Threat Labs has exposed users of Microsoft Azure’s AI and High-Performance Computing (HPC) workloads…

09
May
2025

Analyze resource-based policy dependencies across your AWS Organizations accounts

Managing multiple AWS accounts in an organization can get complicated, especially when trying to understand how services and permissions are…

Chinese Hackers Exploit SAP RCE Flaw CVE-2025-31324, Deploy Golang-Based SuperShell
09
May
2025

Chinese Hackers Exploit SAP RCE Flaw CVE-2025-31324, Deploy Golang-Based SuperShell

May 09, 2025Ravie LakshmananVulnerability / Industrial Security A China-linked unnamed threat actor dubbed Chaya_004 has been observed exploiting a recently…

09
May
2025

Wi-Fi 7 trials show big performance gains for enterprise networks

The next generation of wireless technology is getting a real-world test, and the results are promising. Recent trials led by…