Palo Alto Networks warns that CVE-2025-0111 flaw is actively exploited in attacks
20
Feb
2025

Palo Alto Networks warns that CVE-2025-0111 flaw is actively exploited in attacks

Palo Alto Networks warns that CVE-2025-0111 flaw is actively exploited in attacks Pierluigi Paganini February 20, 2025 Palo Alto Networks…

CISA and FBI Issue Alert as Ghost Ransomware Targets 70+ Organizations
20
Feb
2025

CISA and FBI Issue Alert as Ghost Ransomware Targets 70+ Organizations

The Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) have issued a joint advisory warning…

Ghost Ransomware
20
Feb
2025

Ghost Ransomware Strikes Again—Is Your Organization At Risk?

A Ghost ransomware group also referred to as Cring, has been actively exploiting vulnerabilities in software and firmware as recently…

Windows Disk Cleanup Tool Exploit Allows SYSTEM Privilege Escalation
20
Feb
2025

Windows Disk Cleanup Tool Exploit Allows SYSTEM Privilege Escalation

Microsoft has urgently addressed a high-severity privilege escalation vulnerability (CVE-2025-21420) in the Windows Disk Cleanup Utility (cleanmgr.exe) during its February…

Privilege Escalation Vulnerability
20
Feb
2025

Microsoft Patches Actively Exploited Power Pages Privilege Escalation Vulnerability

Feb 20, 2025Ravie LakshmananSoftware Security / Vulnerability Microsoft has released security updates to address two Critical-rated flaws impacting Bing and…

Citrix NetScaler Vulnerability Exposes Systems to Unauthorized Commands
20
Feb
2025

Citrix NetScaler Vulnerability Exposes Systems to Unauthorized Commands

Cloud Software Group has raced to address a severe security flaw in its widely used NetScaler management infrastructure that could…

Naveen Goud
20
Feb
2025

Ghost Ransomware targeting Obsolete IT Systems

A joint report from the FBI and CISA has revealed that the Ghost Ransomware group has been targeting businesses running…

Unknown and unsecured: The risks of poor asset visibility
20
Feb
2025

Unknown and unsecured: The risks of poor asset visibility

In this Help Net Security interview, Juliette Hudson, CTO of CybaVerse, discusses why asset visibility remains a critical cybersecurity challenge….

Privilege Escalation Vulnerability
20
Feb
2025

Citrix Releases Security Fix for NetScaler Console Privilege Escalation Vulnerability

Feb 20, 2025Ravie LakshmananVulnerability / IT Security Citrix has released security updates for a high-severity security flaw impacting NetScaler Console…

DOGE Now Has Access to the Top US Cybersecurity Agency
20
Feb
2025

DOGE Now Has Access to the Top US Cybersecurity Agency

Edward Coristine, a 19-year-old engineer with Elon Musk’s so-called Department of Government Efficiency (DOGE) known as “Big Balls,” is now…

20
Feb
2025

Case Study: Devonport City Council embraces transformation – Governance

Located in the Northwest of Tasmania, Devonport City Council’s transformation project, ‘Living City’ is one of the largest urban renewal…

Russia-linked APTs target Signal messenger
20
Feb
2025

Russia-linked APTs target Signal messenger

Russia-linked APTs target Signal messenger Pierluigi Paganini February 19, 2025 Russia-linked threat actors exploit Signal ‘s “linked devices” feature to…