New Malware Leverages Windows Character Map to Bypass Windows Defender and Mine Cryptocurrency for The Attackers
05
Sep
2025

New Malware Leverages Windows Character Map to Bypass Windows Defender and Mine Cryptocurrency for The Attackers

A recently discovered strain of cryptomining malware has captured the attention of security teams worldwide by abusing the built-in Windows…

Hollywood’s Battle Against Digital Threats
05
Sep
2025

Hollywood’s Battle Against Digital Threats

The adage “content is king” holds particularly true for the entertainment industry. Millions of people across the globe pursue film, video…

Critical SAP S/4HANA Vulnerability Actively Exploited, Allowing Full System Takeover
05
Sep
2025

Critical SAP S/4HANA Vulnerability Actively Exploited, Allowing Full System Takeover

A critical security flaw in SAP S/4HANA, tracked as CVE-2025-42957, is being actively exploited by attackers, according to research from…

TAG-150 Develops CastleRAT in Python and C, Expanding CastleLoader Malware Operations
05
Sep
2025

TAG-150 Develops CastleRAT in Python and C, Expanding CastleLoader Malware Operations

The threat actor behind the malware-as-a-service (MaaS) framework and loader called CastleLoader has also developed a remote access trojan known…

Jaguar Land Rover cyber attack keeps workers at home
05
Sep
2025

Jaguar Land Rover cyber attack keeps workers at home

Jaguar Land Rover (JLR) has told its car workers to stay away from the assembly lines until at least Tuesday,…

05
Sep
2025

Microsoft gives US students a free year of Microsoft 365 Personal

Microsoft announced that starting this Thursday, all college students in the United States can get a free year of Microsoft…

Hackers Use AI Platforms to Steal Microsoft 365 Credentials in Phishing Campaign
05
Sep
2025

Hackers Use AI Platforms to Steal Microsoft 365 Credentials in Phishing Campaign

Cybercriminals are increasingly exploiting the trust organizations place in artificial intelligence platforms to conduct sophisticated phishing attacks, according to a…

Threat Actors Exploit ScreenConnect Installers for Initial Access
05
Sep
2025

Threat Actors Exploit ScreenConnect Installers for Initial Access

A marked escalation in the abuse of ConnectWise ScreenConnect installers since March 2025, with U.S.-based businesses bearing the brunt of…

SAP
05
Sep
2025

Critical SAP S/4HANA vulnerability now exploited in attacks

A critical SAP S/4HANA code injection vulnerability is being leveraged in attacks in the wild to breach exposed servers, researchers…

North Korean Threat Actors Reveal Their Tactics in Replacing Infrastructure With New Assets
05
Sep
2025

North Korean Threat Actors Reveal Their Tactics in Replacing Infrastructure With New Assets

Over the past year, cybersecurity researchers have observed a surge in activity from North Korean threat actors leveraging military-grade social…

Critical 0-Click Vulnerability Enables Attackers to Takeover Email Access Using Punycode
05
Sep
2025

Critical 0-Click Vulnerability Enables Attackers to Takeover Email Access Using Punycode

A critical, zero-click vulnerability that allows attackers to hijack online accounts by exploiting how web applications handle international email addresses….

Artificial Intelligence Isn’t a Silver Bullet
05
Sep
2025

Artificial Intelligence Isn’t a Silver Bullet

Unless you’ve been living on a desert island or in a cave for the past several years, you’ve surely heard…