Pre-Auth Exploit Chains Found in Commvault Could Enable Remote Code Execution Attacks
21
Aug
2025

Pre-Auth Exploit Chains Found in Commvault Could Enable Remote Code Execution Attacks

Aug 21, 2025Ravie LakshmananVulnerability / Software Security Commvault has released updates to address four security gaps that could be exploited…

Apple addressed the seventh actively exploited zero-day
21
Aug
2025

Apple addressed the seventh actively exploited zero-day

Apple addressed the seventh actively exploited zero-day Pierluigi Paganini August 21, 2025 Apple addressed a vulnerability impacting iOS, iPadOS, and…

Mozilla High Severity Vulnerabilities Enables Remote Code Execution
21
Aug
2025

Mozilla High Severity Vulnerabilities Enables Remote Code Execution

Mozilla has released Firefox 142 to address multiple high-severity security vulnerabilities that could allow attackers to execute arbitrary code remotely…

Vegas, Vulnerabilities, and Voices: Black Hat and Squadcon 2025
21
Aug
2025

Vegas, Vulnerabilities, and Voices: Black Hat and Squadcon 2025

The week of August 4th, I had the opportunity to attend two exciting conferences in the cybersecurity world: Black Hat…

Warlock Ransomware Exploits SharePoint Flaws for Initial Access and Credential Theft
21
Aug
2025

Warlock Ransomware Exploits SharePoint Flaws for Initial Access and Credential Theft

The Warlock ransomware group has intensified its operations by targeting unpatched on-premises Microsoft SharePoint servers, leveraging critical vulnerabilities to achieve…

Europol Denies $50K Reward for Qilin Ransomware Leaders, Calls It a Scam
21
Aug
2025

Europol Denies $50K Reward for Qilin Ransomware, Calls It a Scam

Europol has confirmed that a widely reported $50,000 reward for information on the Qilin ransomware group is a “scam.” The…

Hackers Using New QuirkyLoader Malware to Spread Agent Tesla, AsyncRAT and Snake Keylogger
21
Aug
2025

Hackers Using New QuirkyLoader Malware to Spread Agent Tesla, AsyncRAT and Snake Keylogger

Aug 21, 2025Ravie LakshmananMalware / Email Security Cybersecurity researchers have disclosed details of a new malware loader called QuirkyLoader that’s…

ICO investigates lawfulness of algorithms used in immigration enforcement
21
Aug
2025

ICO investigates lawfulness of algorithms used in immigration enforcement

The Home Office could be banned from unlawfully using computer algorithms to recommend whether migrants should be deported. Privacy International…

Wing FTP Server flaw actively exploited shortly after technical details were made public
21
Aug
2025

Hackers deploy DripDropper via Apache ActiveMQ flaw, patch systems to evade detection

Hackers deploy DripDropper via Apache ActiveMQ flaw, patch systems to evade detection Pierluigi Paganini August 21, 2025 Hackers exploit Apache…

Smiley hacker
21
Aug
2025

Europol confirms $50,000 Qilin ransomware reward is fake

Europol has confirmed that a Telegram channel impersonating the agency and offering a $50,000 reward for information on two Qilin…

Warlock Ransomware Exploiting SharePoint Vulnerabilities to Gain Access and Steal Credentials
21
Aug
2025

Warlock Ransomware Exploiting SharePoint Vulnerabilities to Gain Access and Steal Credentials

In recent weeks, the cybersecurity community has witnessed the rapid emergence of Warlock, a novel ransomware strain that weaponizes unpatched…

Insider Threat Protection Market Size Worth USD 38 Billion by 2036
21
Aug
2025

Insider Threat Protection Market Size Worth USD 38 Billion by 2036

According to recent study by Research Nester, the global insider threat protection market Size was valued at USD 4 billion in 2023…