eBook: Defending Identity Security the Moment It’s Threatened
06
Oct
2025

eBook: Defending Identity Security the Moment It’s Threatened

Credential-based attacks happen in seconds. Learn how to block weak or stolen passwords instantly, safeguard accounts in real time, and…

Adopting an AI Security Solution
06
Oct
2025

5 Critical Questions For Adopting an AI Security Solution

In the era of rapidly advancing artificial intelligence (AI) and cloud technologies, organizations are increasingly implementing security measures to protect…

IT Sustainability Think Tank: Helping IT directors see through suppliers' greenwashing claims
06
Oct
2025

IT Sustainability Think Tank: Helping IT directors see through suppliers’ greenwashing claims

Green promises from technology companies are everywhere. Servers described as carbon neutral, cloud platforms that reportedly run on 100% renewable…

XWorm backdoor resurfaces with dozens of malicious plugins
06
Oct
2025

XWorm malware resurfaces with ransomware module, over 35 plugins

New versions of the XWorm backdoor are being distributed in phishing campaigns after the original developer, XCoder, abandoned the project…

Zabbix Agent and Agent 2 for Windows Vulnerability Let Attackers Escalate Privileges
06
Oct
2025

Zabbix Agent and Agent 2 for Windows Vulnerability Let Attackers Escalate Privileges

A critical security vulnerability has been discovered in Zabbix Agent and Agent 2 for Windows that allows attackers with local…

TamperedChef Malware Disguised as PDF Editor Hijacks Browser Credentials and Opens Backdoors
06
Oct
2025

TamperedChef Malware Disguised as PDF Editor Hijacks Browser Credentials and Opens Backdoors

A sophisticated malware campaign dubbed TamperedChef has successfully compromised European organizations by masquerading as a legitimate PDF editor application, according…

Cl0p exploits Oracle E-Business Suite zero-day in data theft, extortion campaign (CVE-2025-61882)
06
Oct
2025

Cl0p exploits Oracle E-Business Suite zero-day in data theft, extortion campaign (CVE-2025-61882)

The Cl0p extortion gang exploited multiple Oracle E-Business Suite (EBS) vulnerabilities, including one zero-day flaw (CVE-2025-61882), “to steal large amounts…

Dutch cloud pioneers face the hard limits of digital sovereignty
06
Oct
2025

Enterprise software sales through cloud hyperscale marketplaces set to hit $163bn by 2030

Sales of enterprise software through hyperscale cloud marketplaces hosted by the likes of Amazon Web Services (AWS), Microsoft and Google…

Salesforce data theft extortion
06
Oct
2025

Hackers Extorting Salesforce After Stealing Data From Dozens of Customers

A threat actor supposedly formed of members of known hacking groups has claimed the theft of large amounts of data…

Microsoft Teams Set to Introduce Highly Anticipated Multitasking Functionality
06
Oct
2025

Microsoft Teams Set to Introduce Highly Anticipated Multitasking Functionality

Microsoft is set to roll out a highly anticipated multitasking feature for its Teams platform, which will allow users to…

Integrate Gemini CLI into Your Kali Terminal to Speed Up Pentesting Tasks
06
Oct
2025

Integrate Gemini CLI into Your Kali Terminal to Speed Up Pentesting Tasks

With the release of Kali Linux 2025.3, penetration testers and security professionals gain access to an innovative AI-powered assistant, the…

Facebook icon on a mobile phone screen
06
Oct
2025

How to set up two-factor authentication (2FA) on your Facebook account

While two-factor authentication (2FA) is not completely fool-proof, it is one of the best ways to protect your accounts from…