Work-life balance biggest barrier for women in tech, says survey
31
Dec
2025

Top 10 women in tech and diversity in tech stories of 2025

The past year has brought uncertainty for diversity in the tech sector as the landscape in the US turned sour,…

the US, China, and the EU are among the top exploited GEOs
31
Dec
2025

the US, China, and the EU are among the top exploited GEOs

MongoBleed (CVE-2025-14847): the US, China, and the EU are among the top exploited GEOs Pierluigi Paganini December 31, 2025 MongoBleed…

Open-Source C2 Platform AdaptixC2 Released With Enhanced Stability, Performance, and Speed
31
Dec
2025

Open-Source C2 Platform AdaptixC2 Released With Enhanced Stability, Performance, and Speed

The Adaptix Framework team has announced a significant update to AdaptixC2, an open-source post-exploitation and adversarial emulation platform designed for…

Critical Apache StreamPipes Vulnerability Let Attackers Seize Admin Control
31
Dec
2025

Critical Apache StreamPipes Vulnerability Let Attackers Seize Admin Control

A security patch addressing a critical privilege escalation vulnerability that allows unauthorized users to gain administrative access to the data…

31
Dec
2025

What consumers expect from data security

Security teams spend years building controls around data protection, then a survey asks consumers a simple question about responsibility and…

CVE-2025-52691
31
Dec
2025

CSA Warns Of CVE-2025-52691 SmarterMail RCE Flaw

The Cyber Security Agency of Singapore (CSA) has issued a high-priority alert warning organizations and system administrators about a critical…

Digital Services Act, TikTok, Disinformation, Disinformation Campaign, Poland, EU Commission
31
Dec
2025

Poland Calls For EU Investigation Of TikTok Over AI-Generated Disinformation Campaign

Poland’s Ministry of Digital Affairs submitted a formal request to the European Commission, this week, demanding investigation of TikTok for…

31
Dec
2025

Duplicati: Free, open-source backup client

Duplicati is an open source backup client that creates encrypted, incremental, compressed backup sets and sends them to cloud storage…

U.S. Treasury Lifts Sanctions on Three Individuals Linked to Intellexa and Predator Spyware
31
Dec
2025

U.S. Treasury Lifts Sanctions on Three Individuals Linked to Intellexa and Predator Spyware

Dec 31, 2026Ravie LakshmananSpyware / Mobile Security The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) on…

New Open-Source C2 Framework AdaptixC2 Debuts With Improved Stability and Speed
31
Dec
2025

New Open-Source C2 Framework AdaptixC2 Debuts With Improved Stability and Speed

The open-source community has received a major update with the release of AdaptixC2 Version 1.0. This new version brings significant…

31
Dec
2025

Illegal streaming grew into an organized, profitable, and dangerous industry

Rising streaming prices are pushing more viewers toward illegal options. Movies, TV shows, and live sports are now spread across…

New AI-Enhanced Crypter Promoted as Capable of Evading Windows Defender
31
Dec
2025

New AI-Enhanced Crypter Promoted as Capable of Evading Windows Defender

Cybersecurity researchers have spotted a new high-sophistication malware loader being advertised on dark web forums, marketed as a commercial solution…