Italian-made spyware Dante linked to Chrome zero-day exploitation campaign
28
Oct
2025

Italian-made spyware Dante linked to Chrome zero-day exploitation campaign

CVE-2025-2783, a Chrome zero-day vulnerability that was detected being exploited in March 2025 and was subsequently fixed by Google, was…

The API vulnerabilities nobody talks about: excessive data exposure
28
Oct
2025

The API vulnerabilities nobody talks about: excessive data exposure

TLDR: Excessive Data Exposure (leaking internal data via API responses) is the silent, pervasive threat that is more dangerous than…

New Atroposia malware comes with a local vulnerability scanner
28
Oct
2025

New Atroposia malware comes with a local vulnerability scanner

A new malware-as-a-service (MaaS) platform named Atroposia provides cybercriminals a remote access trojan that combines capabilities for persistent access, evasion,…

Ubuntu’s Kernel Vulnerability Let Attackers Escalate Privileges and Gain Root Access
28
Oct
2025

Ubuntu’s Kernel Vulnerability Let Attackers Escalate Privileges and Gain Root Access

A critical vulnerability in Ubuntu’s Linux kernel has been exposed, allowing local attackers to escalate privileges and potentially gain root…

New Android Malware Mimics Human Behavior to Bypass Biometric Security
28
Oct
2025

New Android Malware Mimics Human Behavior to Bypass Biometric Security

A sophisticated new Android banking Trojan named Herodotus has emerged as a significant threat to mobile users, introducing a novel…

IRISSCON 2025 to address the human impact on cybersecurity
28
Oct
2025

IRISSCON 2025 to address the human impact on cybersecurity

Recent high-profile cybersecurity breaches affecting global brands share a common link: the human factor. Expert speakers will cover this subject…

Why Early Threat Detection Is a Must for Long-Term Business Growth
28
Oct
2025

Why Early Threat Detection Is a Must for Long-Term Business Growth

In cybersecurity, speed isn’t just a win — it’s a multiplier. The faster you learn about emerging threats, the faster…

Pulling the plug: A way to halt a cyber attacker in your network?
28
Oct
2025

Pulling the plug: A way to halt a cyber attacker in your network?

There’s a cyber attack under way. An intruder is inside your network: moving freely, collecting data, and setting up a…

Critical ASP.NET flaw hits QNAP NetBak PC Agent
28
Oct
2025

Critical ASP.NET flaw hits QNAP NetBak PC Agent

Critical ASP.NET flaw hits QNAP NetBak PC Agent Pierluigi Paganini October 28, 2025 QNAP warns of critical ASP.NET flaw (CVE-2025-55315)…

X to Phase Out Twitter Domain
28
Oct
2025

X to Phase Out Twitter Domain

Social media platform X announced that it will stop supporting the old Twitter.com website for two-factor authentication (2FA) by November…

MuddyWater’s Phoenix Backdoor Infects More Than 100 Government Organizations
28
Oct
2025

MuddyWater’s Phoenix Backdoor Infects More Than 100 Government Organizations

Advanced Persistent Threat (APT) MuddyWater has orchestrated a sophisticated phishing campaign targeting over 100 government entities across the Middle East,…

Who's Patching Your Network?
28
Oct
2025

Top cyber threats in South Africa

Cyber threats in South Africa are growing more sophisticated every day. According to Cybersecurity Ventures, the total cost of cybercrime globally…