Top 5 Industries Most Vulnerable To Cybercriminals In 2025
08
Jan
2025

Top 5 Industries Most Vulnerable To Cybercriminals In 2025

The rise of cyberattacks has changed the dynamics of global industries, with cybercriminals increasingly targeting sectors that hold vast amounts…

Chrome Type Confusion Vulnerability
08
Jan
2025

Chrome Type Confusion Vulnerability Let Attackers Execute Arbitrary Code Remotely

The Chrome team has announced that the Stable channel has been updated to 131.0.6778.264/.265 for Windows and macOS, and 131.0.6778.264…

The Role of AI in Evolving Cybersecurity Attacks
08
Jan
2025

The Role of AI in Evolving Cybersecurity Attacks

In the ever-expanding digital landscape, cybersecurity remains a critical concern for individuals, businesses, and governments alike. As technology advances, so…

The Fundamental Components to Achieving Shift-Left Success
08
Jan
2025

The Fundamental Components to Achieving Shift-Left Success

“Shift-left” is a familiar concept to CISOs and security practitioners across the globe. A term coined to promote the integration…

Print Friendly, PDF & Email
08
Jan
2025

Collective Defence strategies that boost supply chain resilience for all –

Supply chain security has become an increasingly critical concern for businesses and governments alike. In today’s interconnected digital economy, supply…

08
Jan
2025

Mitel MiCollab, Oracle WebLogic Server vulnerabilities exploited by attackers

CISA has added Mitel MiCollab (CVE-2024-41713, CVE-2024-55550) and Oracle WebLogic Server (CVE-2020-2883) vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog….

Top 5 Malware Threats to Prepare Against in 2025
08
Jan
2025

Top 5 Malware Threats to Prepare Against in 2025

2024 had its fair share of high-profile cyber attacks, with companies as big as Dell and TicketMaster falling victim to…

GenAI demand fuels record sales of datacentre hardware and software in 2024
08
Jan
2025

GenAI demand fuels record sales of datacentre hardware and software in 2024

Demand for generative artificial intelligence (AI) services is being cited as the reason why spending on datacentre hardware and software…

Multiple Sonicwall VPN Vulnerabilities Let Attackers Bypass Authentication
08
Jan
2025

Multiple Sonicwall VPN Vulnerabilities Let Attackers Bypass Authentication

A new security advisory has been released regarding several vulnerabilities in SonicWall’s SonicOS software, which could enable attackers to bypass…

Scammers Impersonate Authorities to Swipe OTPs with Remote Access Apps
08
Jan
2025

Scammers Impersonate Authorities to Swipe OTPs with Remote Access Apps

SUMMARY Sophisticated Scam in the Middle East: Cybercriminals are posing as government officials to carry out refund scams, using remote…

Nato membership boosts Finnish civil and military tech startups
08
Jan
2025

Nato membership boosts Finnish civil and military tech startups

Finland’s fast-expanding defence sector is witnessing a surge in tech startups chasing new business opportunities on the back of the…

Kaaviya Ragupathy
08
Jan
2025

New BIOS/UEFI Vulnerabilities Lets Hackers Hijack Your Firmware

Researchers have identified critical vulnerabilities in Illumina iSeq 100 DNA sequencers due to the absence of essential security features such…