Microsoft to remove the Location History feature in Windows
17
Feb
2025

Microsoft to remove the Location History feature in Windows

Microsoft announced the deprecation of the Location History feature from Windows, which let applications like the Cortana virtual assistant to…

X
17
Feb
2025

X now blocks Signal contact links, flags them as malicious

Social media platform X (formerly Twitter) is now blocking links to “Signal.me,” a URL used by the Signal encrypted messaging…

XCSSET macOS Malware
17
Feb
2025

Microsoft Uncovers New XCSSET macOS Malware Variant with Advanced Obfuscation Tactics

Feb 17, 2025Ravie LakshmananEndpoint Security / Malware Microsoft said it has discovered a new variant of a known Apple macOS…

IDOR Vulnerability in ExHub Allows Attackers to Alter Hosting Configurations
17
Feb
2025

IDOR Vulnerability in ExHub Allows Attackers to Alter Hosting Configurations

A security researcher recently uncovered a high-risk Insecure Direct Object Reference (IDOR) vulnerability in ExHub, a cloud hosting and collaboration…

The Security Interviews: Yevgeny Dibrov, Armis
17
Feb
2025

The Security Interviews: Yevgeny Dibrov, Armis

Over the past 20 to 30 years, the intelligence community has generated a stream of cyber security leaders – private…

Microsoft spots XCSSET macOS malware variant used for crypto theft
17
Feb
2025

Microsoft spots XCSSET macOS malware variant used for crypto theft

A new variant of the XCSSET macOS modular malware has emerged in attacks that target users’ sensitive information, including digital wallets…

Beware! Fake Outlook Support Calls Leading to Ransomware Attacks
17
Feb
2025

Beware! Fake Outlook Support Calls Leading to Ransomware Attacks

Telekom Security has recently uncovered a significant vishing (voice phishing) campaign targeting individuals and organizations across Germany. This operation appears…

Naveen Goud
17
Feb
2025

Akira Ransomware is now targeting legacy servers of defunct companies

In a disturbing yet intriguing development, cyber criminals have once again demonstrated their capacity to target organizations with the sole…

Unlocking OSINT: Top books to learn from
17
Feb
2025

Unlocking OSINT: Top books to learn from

Discover the top Open-Source Intelligence (OSINT) books in this curated list. From investigative techniques to digital footprint analysis, these titles…

AI-driven personalisation appealing to UK shoppers, says research
17
Feb
2025

AI-driven personalisation appealing to UK shoppers, says research

Almost a third of shoppers in the UK have said that personalisation assisted by artificial intelligence (AI) increases their loyalty…

Finastra
17
Feb
2025

Fintech giant Finastra notifies victims of October data breach

Financial technology giant Finastra is notifying victims of a data breach after their personal information was stolen by unknown attackers…

Ransomware Gangs Encrypt Systems After 17hrs From Initial Infection
17
Feb
2025

Ransomware Gangs Encrypt Systems After 17hrs From Initial Infection

New research reveals ransomware gangs are accelerating encryption timelines while adopting advanced evasion techniques and data extortion strategies. A 2025…