New HybridPetya Weaponizing UEFI Vulnerability to Bypass Secure Boot on Outdated Systems
12
Sep
2025

New HybridPetya Weaponizing UEFI Vulnerability to Bypass Secure Boot on Outdated Systems

In late July 2025, a series of ransomware samples surfaced on VirusTotal under filenames referencing the notorious Petya and NotPetya…

Ransomware Tactics Are Shifting. Here’s How to Keep Up
12
Sep
2025

Ransomware Tactics Are Shifting. Here’s How to Keep Up

It’s common knowledge in the cybersecurity industry that ransomware is on the rise, with median demands rising 20% year-over-year across…

Microsoft Windows Defender Firewall Vulnerabilities Allow Privilege Escalation
12
Sep
2025

Microsoft Windows Defender Firewall Vulnerabilities Allow Privilege Escalation

Microsoft has released security advisories for four newly discovered vulnerabilities in its Windows Defender Firewall Service that could enable attackers…

AI Expands $2 Trillion Total Addressable Market For Cybersecurity Providers
12
Sep
2025

30 Top Experts In 2025.

Cybersecurity is an industry brimming with top experts bringing deep domain and subject matter expertise on everything from cybercrime, to…

CISA looks to partners to shore up the future of the CVE Program
12
Sep
2025

CISA looks to partners to shore up the future of the CVE Program

The US Cybersecurity and Infrastructure Security Agency (CISA) has affirmed its continuing support for the Common Vulnerabilities and Exposures (CVE)…

New HybridPetya Ransomware Bypasses UEFI Secure Boot With CVE-2024-7344 Exploit
12
Sep
2025

New HybridPetya Ransomware Bypasses UEFI Secure Boot With CVE-2024-7344 Exploit

Cybersecurity researchers have discovered a new ransomware strain dubbed HybridPetya that resembles the notorious Petya/NotPetya malware, while also incorporating the…

Retailers turn to tech as in-store crime soars
12
Sep
2025

Retailers turn to tech as in-store crime soars

Sainsbury’s CEO Simon Roberts, Wickes chief David Wood, and Fortnum & Mason boss Tom Athron were among the executives to…

12
Sep
2025

How this seasoned bug bounty hunter combines Burp Suite and HackerOne to uncover high-impact vulnerabilities | Blog

Amelia Coen | 12 September 2025 at 12:21 UTC Arman S., a full-time independent security researcher and bug bounty hunter,…

Microsoft Patch for Old Flaw Reveals New Kernel Address Leak Vulnerability in Windows 11/Server 2022 24H2
12
Sep
2025

Microsoft Patch for Old Flaw Reveals New Kernel Address Leak Vulnerability in Windows 11/Server 2022 24H2

A new kernel address leak vulnerability has been discovered in the latest versions of Windows 11 (24H2) and Windows Server…

New Malware Abuses Azure Functions to Host Command and Control Infrastructure
12
Sep
2025

New Malware Abuses Azure Functions to Host Command and Control Infrastructure

A malicious ISO image named Servicenow-BNM-Verify.iso was uploaded to VirusTotal from Malaysia with almost no detections. The image contains four…

Scattered Lapsus$ Hunters Hacker Group Announces Shutdown
12
Sep
2025

Scattered Lapsus$ Hunters Hacker Group Announces Shutdown

Scattered Lapsus$ Hunters, linked to the Jaguar Land Rover cyberattack, claims to shut down as experts suggest the group is…

How AI can help to optimise supply chains under pressure
12
Sep
2025

How AI can help to optimise supply chains under pressure

The flow and ebb of international supply chains is far from new, with the grand medieval churches of the Cotswolds…