U.S. CISA adds Edimax IC-7100 IP Camera, NAKIVO, and SAP NetWeaver AS Java flaws to its Known Exploited Vulnerabilities catalog
20
Mar
2025

U.S. CISA adds Edimax IC-7100 IP Camera, NAKIVO, and SAP NetWeaver AS Java flaws to its Known Exploited Vulnerabilities catalog

U.S. CISA adds Edimax IC-7100 IP Camera, NAKIVO, and SAP NetWeaver AS Java flaws to its Known Exploited Vulnerabilities catalog Pierluigi…

New Steganographic Malware Exploits JPEG Files to Distribute Infostealers
20
Mar
2025

New Steganographic Malware Exploits JPEG Files to Distribute Infostealers

A sophisticated malware campaign employing steganographic techniques has recently been identified, targeting users through seemingly innocent JPEG image files. The…

AI-Powered Cyber Attacks and Data Privacy in The Age of Big Data
20
Mar
2025

AI-Powered Cyber Attacks and Data Privacy in The Age of Big Data

The fast transformation and evolution of artificial intelligence (AI) significantly changed the general norm and operational process of industries. This…

Zero-Hour Phishing Attacks Exploiting Browser Vulnerabilities Surge by 130%
20
Mar
2025

Zero-Hour Phishing Attacks Exploiting Browser Vulnerabilities Surge by 130%

Menlo Security, a leader in Secure Enterprise Browsers, has released its annual State of Browser Security Report, revealing a sharp…

More Than Half Of Ransomware Attacks Bypass Traditional Detection Tools
20
Mar
2025

More Than Half Of Ransomware Attacks Bypass Traditional Detection Tools

20 Mar More Than Half Of Ransomware Attacks Bypass Traditional Detection Tools Posted at 09:11h in Blogs by Taylor Fox…

Government considering redress scheme for families of Post Office scandal victims
20
Mar
2025

Government considering redress scheme for families of Post Office scandal victims

The government is considering a separate scheme to provide redress to the families of subpostmasters affected by the Post Office…

Babuk2 Ransomware Issues Fake Extortion Demands Using Data from Old Breaches
20
Mar
2025

Babuk2 Ransomware Issues Fake Extortion Demands Using Data from Old Breaches

Recent investigations by the Halcyon RISE Team have uncovered a concerning trend in the ransomware landscape: the Babuk2 group is…

Critical Veeam Backup & Replication RCE vulnerability fixed, patch ASAP! (CVE-2025-23120)
20
Mar
2025

Critical Veeam Backup & Replication RCE vulnerability fixed, patch ASAP! (CVE-2025-23120)

Veeam has released fixes for a critical remote code execution vulnerability (CVE-2025-23120) affecting its enterprise Veeam Backup & Replication solution,…

Shared Responsibility Model
20
Mar
2025

Mastering the Shared Responsibility Model

Cybersecurity isn’t just another checkbox on your business agenda. It’s a fundamental pillar of survival. As organizations increasingly migrate their…

Critical Veeam Backup & Replication Vulnerability Allows Remote Execution of Malicious Code
20
Mar
2025

Critical Veeam Backup & Replication Vulnerability Allows Remote Execution of Malicious Code

A critical vulnerability in Veeam Backup & Replication software has been disclosed, posing a significant risk to users. This vulnerability,…

CISA Adds NAKIVO Vulnerability to KEV Catalog Amid Active Exploitation
20
Mar
2025

CISA Adds NAKIVO Vulnerability to KEV Catalog Amid Active Exploitation

Mar 20, 2025Ravie LakshmananCybersecurity / Vulnerability The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a high-severity security flaw…

Dell Alerts on Critical Secure Connect Gateway Vulnerabilities
20
Mar
2025

Dell Alerts on Critical Secure Connect Gateway Vulnerabilities

Dell has issued several critical security alerts regarding vulnerabilities in its Secure Connect Gateway (SCG) products. These vulnerabilities pose significant…