CISA Alerts on Actively Exploited Gladinet CentreStack and Triofox Flaws
17
Dec
2025

CISA Alerts on Actively Exploited Gladinet CentreStack and Triofox Flaws

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a new alert regarding a critical security vulnerability affecting Gladinet CentreStack…

XM Cyber bridges external attack surface management with validated internal attack paths
17
Dec
2025

XM Cyber bridges external attack surface management with validated internal attack paths

XM Cyber announced an update to its platform that connects External Attack Surface Management with internal risk validation, closing the…

GhostPoster Malware Found in 17 Firefox Add-ons with 50,000+ Downloads
17
Dec
2025

GhostPoster Malware Found in 17 Firefox Add-ons with 50,000+ Downloads

Dec 17, 2025Ravie LakshmananAd Fraud / Browser Security A new campaign named GhostPoster has leveraged logo files associated with 17…

The Annual Meetings of the WEF Global Future Councils and Cybersecurity was held in Dubai in October. AI and digitalisation provide hackers with more opportunities for cyberattacks
17
Dec
2025

rewrite this content and keep HTML tags as is: Cybersecurity companies bullish on Mena opportunities

rewrite this content and keep HTML tags as is: 2025 cyberattacks may cost $57bn AI having major impact Hackers have…

NVIDIA Isaac Lab Vulnerability Let Attackers Execute Malicious Code
17
Dec
2025

NVIDIA Isaac Lab Vulnerability Let Attackers Execute Malicious Code

A critical security update addressing a dangerous deserialization vulnerability in NVIDIA Isaac Lab, a component of the NVIDIA Isaac Sim…

Cellik Android Malware Uses One-Click APK Builder to Hide in Play Store Apps
17
Dec
2025

Cellik Android Malware Uses One-Click APK Builder to Hide in Play Store Apps

A newly discovered Android Remote Access Trojan (RAT) called Cellik is democratizing sophisticated mobile surveillance attacks by bundling advanced spyware…

Trellix advances NDR to close the OT-IT threat detection-to-response gap
17
Dec
2025

Trellix advances NDR to close the OT-IT threat detection-to-response gap

Trellix announced Trellix NDR innovations, strengthening OT-IT security with integrated visibility across complex environments, enhanced detection capabilities, and automated investigation…

Spyware and RATs used to target WhatsApp and Signal Users
17
Dec
2025

U.S. CISA adds a flaw in multiple Fortinet products to its Known Exploited Vulnerabilities catalog

U.S. CISA adds a flaw in multiple Fortinet products to its Known Exploited Vulnerabilities catalog Pierluigi Paganini December 17, 2025…

New Moonwalk++ PoC Demonstrates How Malware Can Forge Windows Call Stacks to Evade Detection
17
Dec
2025

New Moonwalk++ PoC Demonstrates How Malware Can Forge Windows Call Stacks to Evade Detection

Security researchers have unveiled a dangerous new technique that allows malware to completely hide its tracks by faking Windows call…

How DPDP Rules Help Detect Deceptive Synthetic Identities
17
Dec
2025

How DPDP Rules Help Detect Deceptive Synthetic Identities

Nikhil Jhanji, Principal Product Manager, Privy by IDfy. The DPDP rules have finally given enterprises a clear structure for how…

report-ad-banner
17
Dec
2025

UK Report Links South Korean Telecom Breach

A recent report by British technology research firm Rethink Technology Research has raised serious concerns over a cyberattack on KT, South Korea’s…

Gov backs its own AI adoption with $225m
17
Dec
2025

Gov backs its own AI adoption with $225m

The federal government will invest $225 million into AI for its own use over the next four years, largely via…