SilentPrism and DarkWisp
31
Mar
2025

Russian Hackers Exploit CVE-2025-26633 via MSC EvilTwin to Deploy SilentPrism and DarkWisp

The threat actors behind the zero-day exploitation of a recently-patched security vulnerability in Microsoft Windows have been found to deliver…

Unsupervised Learning Newsletter NO. 384
31
Mar
2025

Unsupervised Learning Newsletter NO. 384

Unsupervised Learning is a Security, AI, and Meaning-focused podcast that looks at how best to thrive as humans in a…

Enterprises beef up cybersecurity plans to mitigate AI risks
31
Mar
2025

Enterprises beef up cybersecurity plans to mitigate AI risks

Dive Brief: Enterprises are working to address AI’s risks as adoption increases, according to a report published this week by…

WordPress
31
Mar
2025

Hackers abuse WordPress MU-Plugins to hide malicious code

Hackers are utilizing the WordPress mu-plugins (“Must-Use Plugins”) directory to stealthily run malicious code on every page while evading detection….

CrushFTP Vulnerability Exploited to Bypass Authentication
31
Mar
2025

CrushFTP Vulnerability Exploited to Bypass Authentication

A critical vulnerability (CVE-2025-2825) in CrushFTP, a widely used enterprise file transfer solution, allows attackers to bypass authentication and gain…

UK law enforcement data adequacy at risk
31
Mar
2025

UK law enforcement data adequacy at risk

The UK government has introduced its Data Use and Access Bill (DUAB) to Parliament, but proposed reforms to police data…

NVIDIA NeMo Guardrails | Daniel Miessler
31
Mar
2025

NVIDIA NeMo Guardrails | Daniel Miessler

One of the biggest challenges companies are facing right now with AI systems is how to deploy them securely. Especially…

Hacker linked to Oracle Cloud intrusion threatens to sell stolen data
31
Mar
2025

Hacker linked to Oracle Cloud intrusion threatens to sell stolen data

The threat actor that claimed responsibility for an alleged data breach at Oracle Cloud is threatening to release or sell…

North Korea
31
Mar
2025

North Korean hackers adopt ClickFix attacks to target crypto firms

The notorious North Korean Lazarus hacking group has reportedly adopted ‘ClickFix’ tactics to deploy malware targeting job seekers in the…

Cannon Printer Vulnerability Let Attackers Execute Arbitrary Code
31
Mar
2025

Cannon Printer Vulnerability Let Attackers Execute Arbitrary Code

Canon has issued a critical security advisory regarding a severe vulnerability detected in several of its printer drivers that could…

Naveen Goud
31
Mar
2025

Zoom software leading to BlackSuit Ransomware drop on Windows

Zoom, the popular video conferencing software widely used by businesses across the globe for meetings and virtual collaboration, has recently…

Understanding of ‘black box’ IT systems will reduce Post Office scandal-like risk
31
Mar
2025

Understanding of ‘black box’ IT systems will reduce Post Office scandal-like risk

Another Post Office scandal could be avoided if leaders in public bodies understand the “black box” IT systems that run…