New QUIC-LEAK Vulnerability Let Attackers Exhaust Server Memory and Trigger DoS Attack
21
Aug
2025

New QUIC-LEAK Vulnerability Let Attackers Exhaust Server Memory and Trigger DoS Attack

A critical pre-handshake vulnerability in the LSQUIC QUIC implementation that allows remote attackers to crash servers through memory exhaustion attacks. …

Managing Technical Sprawl to Enhance Security of Healthcare Data
21
Aug
2025

Managing Technical Sprawl to Enhance Security of Healthcare Data

The healthcare industry, one of the most targeted for data breaches, is facing an escalating crisis. According to the White House,…

YouTube logo
21
Aug
2025

Google settles YouTube lawsuit over kids’ privacy invasion and data collection

Google has agreed to a $30 million settlement in the US over allegations that it illegally collected data from underage…

NHS trust accused of ‘at best cavalier, at worst deceitful’ behaviour after deleting emails
21
Aug
2025

Judge throws out NHS whistleblower’s challenge to ruling on deletion of 90,000 emails

An NHS doctor has lost his appeal to challenge a court decision that cleared a hospital trust over allegations of…

Russia
21
Aug
2025

FBI warns of Russian hackers exploiting 7-year-old Cisco flaw

The Federal Bureau of Investigation (FBI) has warned that hackers linked to Russia’s Federal Security Service (FSB) are targeting critical…

Threat Actors Weaponize PDF Editor With New Torjan to Turn Device Into Proxy
21
Aug
2025

Threat Actors Weaponize PDF Editor With New Torjan to Turn Device Into Proxy

Cybersecurity researchers have uncovered a sophisticated new threat campaign that leverages a seemingly legitimate PDF editor application to transform infected…

Commvault Backup Suite Flaws Allow Attackers to Breach On-Premises Systems
21
Aug
2025

Commvault Backup Suite Flaws Allow Attackers to Breach On-Premises Systems

Security researchers have uncovered a critical series of vulnerabilities in Commvault’s backup and data management software that could enable attackers…

Don't Be Clueless About AI, Social Media, And Cybersecurity
21
Aug
2025

The Past, Present and Future of Women In Cybersecurity

21 Aug The Past, Present and Future of Women In Cybersecurity Posted at 08:22h in Blogs by Taylor Fox This…

Apple logo
21
Aug
2025

All Apple users should update after company patches zero-day vulnerability in all platforms

Apple has released security updates for iPhones, iPads and Macs to fix a zero-day vulnerability (a vulnerability which Apple was…

T-Levels not attracting as many students as hoped
21
Aug
2025

Number of girls taking GCSE computer science drops amid fall in overall candidates

The number of girls choosing to take a GCSE in computer science fell this year, breaking a consistent growth streak….

FBI Warns of Russian Government Hackers Attacking Networking Devices of Critical Infrastructure
21
Aug
2025

FBI Warns of Russian Government Hackers Attacking Networking Devices of Critical Infrastructure

The Federal Bureau of Investigation has issued a critical security alert regarding sophisticated cyber operations conducted by Russian Federal Security…

New SHAMOS Malware Targets macOS Through Fake Help Sites to Steal Login Credentials
21
Aug
2025

New SHAMOS Malware Targets macOS Through Fake Help Sites to Steal Login Credentials

Cybersecurity researchers at CrowdStrike identified and thwarted a sophisticated malware campaign deploying SHAMOS, an advanced variant of the Atomic macOS…