Chrome Security Update Fixes Remote Code Execution Flaws
17
Dec
2025

Chrome Security Update Fixes Remote Code Execution Flaws

Google has released an emergency security update for the Chrome browser, addressing two high-severity vulnerabilities that could enable remote code…

Resilience for resilience: Managing burnout among cyber leaders
17
Dec
2025

Security platform consolidation in 2026: The AI imperative

By Published: 17 Dec 2025 AI leaves us no other choice but to consolidate cyber security platforms; in 2026, organisations…

New ClickFix 'Word Online' Message Tricks Users into Installing DarkGate Malware
17
Dec
2025

New ClickFix ‘Word Online’ Message Tricks Users into Installing DarkGate Malware

A sophisticated social engineering campaign dubbed “ClickFix” has emerged, targeting users with deceptive “Word Online” error messages to distribute the…

Microsoft Will Finally Kill an Encryption Cipher That Enabled a Decade of Windows Hacks
17
Dec
2025

Microsoft Will Finally Kill an Encryption Cipher That Enabled a Decade of Windows Hacks

Microsoft is killing off an obsolete and vulnerable encryption cipher that Windows has supported by default for 26 years. This…

Blind Eagle Hackers Exploit Trust to Bypass Email Security Controls
17
Dec
2025

Blind Eagle Hackers Exploit Trust to Bypass Email Security Controls

BlindEagle threat actors are exploiting compromised internal email accounts to launch spear-phishing campaigns that bypass traditional email security controls, targeting…

Simplify IT, save money and carbon: The rise of the minimalist CIO
17
Dec
2025

IT Sustainability Think Tank: What enterprises must do to make sustainability work in 2026

As 2025 draws to a close, sustainability has shifted from the periphery of corporate strategy to the centre of operational…

Cellik live screen streaming (Source - iVerify)
17
Dec
2025

Cellik Android Malware with One-Click APK Builder Let Attackers Wrap its Payload Inside with Google Play Store Apps

Cellik represents a significant evolution in Android Remote Access Trojan capabilities, introducing sophisticated device control and surveillance features previously reserved…

CISA Alerts on Actively Exploited Gladinet CentreStack and Triofox Flaws
17
Dec
2025

CISA Alerts on Actively Exploited Gladinet CentreStack and Triofox Flaws

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a new alert regarding a critical security vulnerability affecting Gladinet CentreStack…

XM Cyber bridges external attack surface management with validated internal attack paths
17
Dec
2025

XM Cyber bridges external attack surface management with validated internal attack paths

XM Cyber announced an update to its platform that connects External Attack Surface Management with internal risk validation, closing the…

GhostPoster Malware Found in 17 Firefox Add-ons with 50,000+ Downloads
17
Dec
2025

GhostPoster Malware Found in 17 Firefox Add-ons with 50,000+ Downloads

Dec 17, 2025Ravie LakshmananAd Fraud / Browser Security A new campaign named GhostPoster has leveraged logo files associated with 17…

The Annual Meetings of the WEF Global Future Councils and Cybersecurity was held in Dubai in October. AI and digitalisation provide hackers with more opportunities for cyberattacks
17
Dec
2025

rewrite this content and keep HTML tags as is: Cybersecurity companies bullish on Mena opportunities

rewrite this content and keep HTML tags as is: 2025 cyberattacks may cost $57bn AI having major impact Hackers have…

NVIDIA Isaac Lab Vulnerability Let Attackers Execute Malicious Code
17
Dec
2025

NVIDIA Isaac Lab Vulnerability Let Attackers Execute Malicious Code

A critical security update addressing a dangerous deserialization vulnerability in NVIDIA Isaac Lab, a component of the NVIDIA Isaac Sim…