A recent and significant cybersecurity threat has emerged involving a critical vulnerability in Apache Tomcat, identified as CVE-2025-24813. This vulnerability…
Cybersecurity experts have uncovered how hackers use Cascading Style Sheets (CSS) to deceive spam filters and monitor user behavior. This…
March 14, 2025 – A shocking amount of iOS apps in Apple’s App Store contained hard-coded secrets. Secrets that could…
The Singapore Cyber Emergency Response Team (SingCERT) has issued a warning regarding the rise in fraudulent emails, with scammers impersonating…
A recent disclosure by Cisco Talos’ Vulnerability Discovery & Research team highlighted several vulnerability issues in Adobe Acrobat. All of…
The Malaysia Computer Emergency Response Team (MyCERT) has reported several Drupal vulnerabilities within its AI module, specifically affecting versions prior to…
In 2024, a significant surge in hacking activities targeting social media and email accounts was reported, according to Action Fraud….
As artificial intelligence (AI) continues to evolve, so do the tactics employed by cybercriminals. AI-based cyber threats have become increasingly…
Hackers exploit a vulnerability in TP-Link routers, specifically the TL-WR845N model, to gain full control over the system. This exploit…
Packed with real-world case studies and practical examples, Cybersecurity Tabletop Exercises offers insights into how organizations have successfully leveraged tabletop…
IntelMQ is an open-source solution designed to help IT security teams (including CERTs, CSIRTs, SOCs, and abuse departments) streamline the…
The former chief technology officer of Microsoft Australia Lee Hickin is to lead the federal government’s “reshaped” National AI Centre….











