Threat Actors May Leverage CI/CD Environments to Gain Access To Restricted Resources
08
Apr
2025

Threat Actors May Leverage CI/CD Environments to Gain Access To Restricted Resources

Cybersecurity experts have observed a concerning trend where sophisticated threat actors are increasingly targeting Continuous Integration/Continuous Deployment (CI/CD) pipelines to…

Android logo
08
Apr
2025

Google fixes two actively exploited zero-day vulnerabilities in Android

Google has patched 62 vulnerabilities in Android, including two actively exploited zero-days in its April 2025 Android Security Bulletin. When…

Malicious Excel Files Targeting Ukraine
08
Apr
2025

UAC-0226 Deploys GIFTEDCROOK Stealer via Malicious Excel Files Targeting Ukraine

The Computer Emergency Response Team of Ukraine (CERT-UA) has revealed a new set of cyber attacks targeting Ukrainian institutions with…

What is the impact of US tariffs on datacentre equipment costs?
08
Apr
2025

What is the impact of US tariffs on datacentre equipment costs?

There has been turmoil across global financial markets following the introduction of the new US tariffs, and datacentre equipment providers…

ASEAN
08
Apr
2025

Cybersecurity In ASEAN: Balancing Innovation And Risk

By Salleh Kodri, SE Regional Manager, Cyble The rapid digitalization of ASEAN economies has unlocked immense opportunities for growth and innovation….

Apple vs. AT&T | Daniel Miessler
08
Apr
2025

Apple vs. AT&T | Daniel Miessler

As you may have heard, AT&T’s chief executive disclosed last week that the second version of the iPhone will be…

Google to Patch 23-years Old Chrome Vulnerability That Leaks Browsing History
08
Apr
2025

Google to Patch 23-years Old Chrome Vulnerability That Leaks Browsing History

Google has announced a significant security improvement for Chrome version 136. This update addresses a 23-year-old vulnerability that could allow…

Agentic AI in the SOC
08
Apr
2025

Agentic AI in the SOC

Security Operations Centers (SOCs) today face unprecedented alert volumes and increasingly sophisticated threats. Triaging and investigating these alerts are costly,…

CVE-2025-31161
08
Apr
2025

CISA Adds CVE-2025-31161 To KEV Catalog

The Cybersecurity and Infrastructure Security Agency (CISA) has recently added a new vulnerability to its Known Exploited Vulnerabilities Catalog. The…

How to Name a Suburb Development
08
Apr
2025

How to Name a Suburb Development

We’ve all seen them — these contrived little mini-communities with perfect landscaping and uppity names. Here’s how to name one….

Linux 6.15-rc1 Released With Major Driver Update & Perfomance Boost
08
Apr
2025

Linux 6.15-rc1 Released With Major Driver Update & Perfomance Boost

The Linux community has unveiled the highly anticipated Linux 6.15-rc1 test kernel, marking a significant milestone in the ongoing evolution…

Everest ransomware group’s Tor leak site offline after a defacement
08
Apr
2025

Everest ransomware group’s Tor leak site offline after a defacement

Everest ransomware group’s Tor leak site offline after a defacement Pierluigi Paganini April 08, 2025 The Tor leak site of…