Editor
27
Mar
2025

Kathryn Thornton: First Service Mission to the Hubble Space Telescope

The veteran of four space missions discusses challenges faced by the Hubble Space Telescope and how human ingenuity and teamwork…

The Hidden Risks Lurking in Your Business Logic
27
Mar
2025

The Hidden Risks Lurking in Your Business Logic

Modern organizations are becoming increasingly reliant on agentic AI, and for good reason: AI agents can dramatically improve efficiency and…

DrayTek routers face active exploitation of older vulnerabilities
27
Mar
2025

DrayTek routers face active exploitation of older vulnerabilities

Dive Brief: Researchers warn that three older vulnerabilities in DrayTek routers have been actively exploited in recent weeks, which coincides…

Intelligence chiefs insist Signal chat was a simple mistake
27
Mar
2025

Intelligence chiefs insist Signal chat was a simple mistake

U.S. intelligence leaders found themselves under intensified scrutiny from Congress for a second straight day, following revelations that significant military…

Editor
27
Mar
2025

Zero-click exploit abusing Firefox and Windows zero days

The backdoor can execute commands and lets attackers download additional modules onto the victim’s machine, ESET research finds 26 Nov…

Operation Red Card - 300+ Cyber Criminals Arrested Linking to Multiple Hacking Activities
24
Mar
2025

Operation Red Card – 300+ Cyber Criminals Arrested Linking to Multiple Hacking Activities

INTERPOL led a multi-national law enforcement operation dubbed “Operation Red Card,” which has resulted in the arrest of over 300…

Protecting your personal information from data brokers
24
Mar
2025

Protecting your personal information from data brokers

How aware are you that your personal information could be bought and sold without your consent—and that there are companies…

Why I am challenging Yvette Cooper’s ‘secret back door’ order against Apple’s encryption
24
Mar
2025

Why I am challenging Yvette Cooper’s ‘secret back door’ order against Apple’s encryption

Security is hard. It’s even harder now that, apparently, the UK Government has secretly ordered Apple to reduce the security…

SuperBlack ransomware strain used in attacks targeting Fortinet vulnerabilities
24
Mar
2025

Critical Apache Tomcat RCE vulnerability exploited

Dive Brief: Researchers from GreyNoise on Thursday reported active exploitation of CVE-2025-24813, a critical remote code execution vulnerability in Apache Tomcat…

Editor
24
Mar
2025

A new chapter in UEFI threats

ESET researchers make a discovery that signals a shift on the UEFI threat landscape and underscores the need for vigilance…

Hackers Using Fake Semrush Ads to Steal Google Accounts Login Credentials
24
Mar
2025

Hackers Using Fake Semrush Ads to Steal Google Accounts Login Credentials

A sophisticated phishing campaign targeting Google account credentials through fake Semrush advertisements has emerged, posing a significant threat to digital…

Arsen Introduces AI-Powered Phishing Tests to Improve Social Engineering Resilience
24
Mar
2025

Arsen Introduces AI-Powered Phishing Tests to Improve Social Engineering Resilience

Paris, France, March 24th, 2025, CyberNewsWire Arsen, a leading cybersecurity company specializing in social engineering defense, today announced the full…