SolarWinds fixes critical Web Help Desk RCE vulnerability (CVE-2025-26399)
24
Sep
2025

SolarWinds fixes critical Web Help Desk RCE vulnerability (CVE-2025-26399)

SolarWinds has fixed yet another unauthenticated remote code execution vulnerability (CVE-2025-26399) in Web Help Desk (WHD), its popular web-based IT…

The Blind Spot Fueling Payment Skimmer Attacks
24
Sep
2025

The Blind Spot Fueling Payment Skimmer Attacks

Think payment iframes are secure by design? Think again. Sophisticated attackers have quietly evolved malicious overlay techniques to exploit checkout…

Jaguar Land Rover Cyberattack Halts Production Until Oct 1
24
Sep
2025

Jaguar Land Rover Cyberattack Halts Production Until Oct 1

Jaguar Land Rover (JLR) has announced an extension of its production shutdown until October 1, 2025, following a major cyberattack…

Python
24
Sep
2025

PyPI urges users to reset credentials after new phishing attacks

The Python Software Foundation has warned victims of a new wave of phishing attacks using a fake Python Package Index…

Hackers Can Compromise Chromium Browsers in Windows by Loading Arbitrary Extensions
24
Sep
2025

Hackers Can Compromise Chromium Browsers in Windows by Loading Arbitrary Extensions

Chromium-based browsers, including Chrome, Edge, and Brave, manage installed extensions via JSON preference files stored under %AppData%GoogleUser DataDefaultPreferences (for domain-joined machines)…

Geopolitical Cyber Threats in 2024: Navigating Emerging Risks with OSINT (Open-Source Intelligence)
24
Sep
2025

Geopolitical Cyber Threats in 2024: Navigating Emerging Risks with OSINT (Open-Source Intelligence)

Geopolitical tensions worldwide can have a foreseeable impact on an organisation’s physical operations, but they can also heighten the risk…

Attackers Use Domain Fronting to Tunnel Malicious Traffic via Google Meet, YouTube and Chrome Update Servers
24
Sep
2025

Attackers Use Domain Fronting to Tunnel Malicious Traffic via Google Meet, YouTube and Chrome Update Servers

Attackers have discovered a way to exploit Google’s core services, Google Meet, YouTube, Chrome update servers and more using a…

Software QA Teams Prevent Cyber Disasters By Finding Vulnerabilities Before Hackers Do
24
Sep
2025

Hacks And Identity Theft Hit Harder Than Ever. Consumers Are Prime Targets.

24 Sep Hacks And Identity Theft Hit Harder Than Ever. Consumers Are Prime Targets. Posted at 08:52h in Blogs by…

Libraesva ESG zero-day vulnerability exploited by attackers (CVE-2025-59689)
24
Sep
2025

Libraesva ESG zero-day vulnerability exploited by attackers (CVE-2025-59689)

Suspected state-sponsored attackers have exploited a zero-day vulnerability (CVE-2025-59689) in the Libraesva Email Security Gateway (ESG), the Italian email security…

drone over highway
24
Sep
2025

Police using drones to read your license plates, warns EFF

Police are using drones as flying automated license plate readers (ALPRs), according to a report by the Electronic Frontier Foundation…

New YiBackdoor Malware
24
Sep
2025

New YiBackdoor Malware Shares Major Code Overlaps with IcedID and Latrodectus

Sep 24, 2025Ravie LakshmananMalware / Windows Security Cybersecurity researchers have disclosed details of a new malware family dubbed YiBackdoor that…

Aircraft hack
24
Sep
2025

European Airport Cyberattack Linked to Obscure Ransomware, Suspect Arrested

The recent cyberattack aimed at aerospace and defense company Collins Aerospace, which has caused significant disruptions at major airports in…