ESET Threat Report H2 2025
17
Dec
2025

ESET Threat Report H2 2025

A view of the H2 2025 threat landscape as seen by ESET telemetry and from the perspective of ESET threat…

CISA Warns of Gladinet CentreStack and Triofox Vulnerability Exploited in Attacks
17
Dec
2025

CISA Warns of Gladinet CentreStack and Triofox Vulnerability Exploited in Attacks

CISA issued a critical warning regarding a hardcoded cryptographic key vulnerability affecting Gladinet CentreStack and Triofox file management solutions.  The…

Chrome Security Update Fixes Remote Code Execution Flaws
17
Dec
2025

Chrome Security Update Fixes Remote Code Execution Flaws

Google has released an emergency security update for the Chrome browser, addressing two high-severity vulnerabilities that could enable remote code…

Resilience for resilience: Managing burnout among cyber leaders
17
Dec
2025

Security platform consolidation in 2026: The AI imperative

By Published: 17 Dec 2025 AI leaves us no other choice but to consolidate cyber security platforms; in 2026, organisations…

New ClickFix 'Word Online' Message Tricks Users into Installing DarkGate Malware
17
Dec
2025

New ClickFix ‘Word Online’ Message Tricks Users into Installing DarkGate Malware

A sophisticated social engineering campaign dubbed “ClickFix” has emerged, targeting users with deceptive “Word Online” error messages to distribute the…

Microsoft Will Finally Kill an Encryption Cipher That Enabled a Decade of Windows Hacks
17
Dec
2025

Microsoft Will Finally Kill an Encryption Cipher That Enabled a Decade of Windows Hacks

Microsoft is killing off an obsolete and vulnerable encryption cipher that Windows has supported by default for 26 years. This…

Blind Eagle Hackers Exploit Trust to Bypass Email Security Controls
17
Dec
2025

Blind Eagle Hackers Exploit Trust to Bypass Email Security Controls

BlindEagle threat actors are exploiting compromised internal email accounts to launch spear-phishing campaigns that bypass traditional email security controls, targeting…

Simplify IT, save money and carbon: The rise of the minimalist CIO
17
Dec
2025

IT Sustainability Think Tank: What enterprises must do to make sustainability work in 2026

As 2025 draws to a close, sustainability has shifted from the periphery of corporate strategy to the centre of operational…

Cellik live screen streaming (Source - iVerify)
17
Dec
2025

Cellik Android Malware with One-Click APK Builder Let Attackers Wrap its Payload Inside with Google Play Store Apps

Cellik represents a significant evolution in Android Remote Access Trojan capabilities, introducing sophisticated device control and surveillance features previously reserved…

CISA Alerts on Actively Exploited Gladinet CentreStack and Triofox Flaws
17
Dec
2025

CISA Alerts on Actively Exploited Gladinet CentreStack and Triofox Flaws

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a new alert regarding a critical security vulnerability affecting Gladinet CentreStack…

XM Cyber bridges external attack surface management with validated internal attack paths
17
Dec
2025

XM Cyber bridges external attack surface management with validated internal attack paths

XM Cyber announced an update to its platform that connects External Attack Surface Management with internal risk validation, closing the…

GhostPoster Malware Found in 17 Firefox Add-ons with 50,000+ Downloads
17
Dec
2025

GhostPoster Malware Found in 17 Firefox Add-ons with 50,000+ Downloads

Dec 17, 2025Ravie LakshmananAd Fraud / Browser Security A new campaign named GhostPoster has leveraged logo files associated with 17…