Microsoft Windows GUI 0-Day Vulnerability Actively Exploited in the Wild
14
Feb
2025

Microsoft Windows GUI 0-Day Vulnerability Actively Exploited in the Wild

A newly discovered vulnerability in Microsoft Windows, identified by ClearSky Cyber Security, is reportedly being actively exploited by the Chinese…

Jane Devry
14
Feb
2025

It’s Time to Move Beyond Awareness Training: Why Readiness Is the New Standard for Cybersecurity

For years, cybersecurity training programs have been stuck in the same rut: entertaining videos, knowledge-heavy lectures, and phishing tests that…

RansomHub
14
Feb
2025

RansomHub Becomes 2024’s Top Ransomware Group, Hitting 600+ Organizations Globally

The threat actors behind the RansomHub ransomware-as-a-service (RaaS) scheme have been observed leveraging now-patched security flaws in Microsoft Active Directory…

Government launches consultation on plan to streamline business through e-invoicing
14
Feb
2025

Government launches consultation on plan to streamline business through e-invoicing

The government has asked businesses for comment on a UK approach to electronic invoicing (e-invoicing), which is part of its…

NVIDIA Container Toolkit Vulnerable to Code Execution Attacks
14
Feb
2025

NVIDIA Container Toolkit Vulnerable to Code Execution Attacks

NVIDIA has issued a critical security update to address a high-severity vulnerability discovered in the NVIDIA® Container Toolkit for Linux….

device-code-phishing
14
Feb
2025

Russian-Linked Hackers Using ‘Device Code Phishing’ to Hijack Accounts

Feb 14, 2025Ravie LakshmananEnterprise Security / Cyber Attack Microsoft is calling attention to an emerging threat cluster it calls Storm-2372…

Windows Server 2025
14
Feb
2025

Microsoft fixes bug causing Windows Server 2025 boot errors

​Microsoft has fixed a known issue causing “boot device inaccessible” errors during startup on some Windows Server 2025 systems using…

WinZip Vulnerability Allows Remote Attackers to Execute Arbitrary Code
14
Feb
2025

WinZip Vulnerability Allows Remote Attackers to Execute Arbitrary Code

A newly discovered vulnerability in WinZip, a popular file compression and archiving utility, has raised alarms among cybersecurity experts. Identified…

AI-Powered Social Engineering
14
Feb
2025

AI-Powered Social Engineering: Ancillary Tools and Techniques

Social engineering is advancing fast, at the speed of generative AI. This is offering bad actors multiple new tools and…

Hackers Actively Exploiting New PAN-OS Authentication Bypass Vulnerability
14
Feb
2025

Hackers Actively Exploiting New PAN-OS Authentication Bypass Vulnerability

Palo Alto Networks has released a patch for a high-severity authentication bypass vulnerability, identified as CVE-2025-0108, affecting their PAN-OS software. GreyNoise…

Hackers Exploiting Newly Discovered PAN-OS Authentication Bypass Vulnerability
14
Feb
2025

Hackers Exploiting Newly Discovered PAN-OS Authentication Bypass Vulnerability

Threat actors actively exploit a new high-severity vulnerability, CVE-2025-0108, in Palo Alto Networks’ PAN-OS. This exploit allows attackers to bypass…

WinZip Vulnerability Let Remote Attackers Execute Arbitrary Code
14
Feb
2025

WinZip Vulnerability Let Remote Attackers Execute Arbitrary Code

A newly disclosed high-severity vulnerability in WinZip, tracked as CVE-2025-1240, enables remote attackers to execute arbitrary code on affected systems…