Microsoft Office.com Suffers Major Outage, Investigation Underway
20
Aug
2025

Microsoft Office.com Suffers Major Outage, Investigation Underway

Microsoft’s comprehensive suite of online services, including the central Office.com portal, is currently experiencing a significant and widespread outage, leaving…

CERT/CC Issues Alert on Critical Flaws in Workhorse Municipal Accounting Software
20
Aug
2025

CERT/CC Issues Alert on Critical Flaws in Workhorse Municipal Accounting Software

The Computer Emergency Response Team Coordination Center (CERT/CC) has issued a critical security advisory warning of severe vulnerabilities in Workhorse…

New DripDropper Malware Exploits Linux Flaw Then Patches It Lock Rivals Out
20
Aug
2025

New DripDropper Malware Exploits Linux Flaw Then Patches It Lock Rivals Out

A new report from Red Canary reveals a clever Linux malware called DripDropper that exploits a flaw and then patches…

Threat Actors Allegedly Listed Windows Zero-Day RCE Exploit For Sale on Dark Web
20
Aug
2025

Threat Actors Allegedly Listed Windows Zero-Day RCE Exploit For Sale on Dark Web

An alleged threat actor has listed a Windows Zero-Day Remote Code Execution (RCE) exploit for sale, claiming it targets fully…

Need Of Counterintelligence in Combating Transnational Crime and Terrorism
20
Aug
2025

Need Of Counterintelligence in Combating Transnational Crime and Terrorism

The bad actors are capitalizing on cutting-edge technologies as any of their activities must leave some footage within an ICT…

Copilot Vulnerability Lets Attackers Bypass Audit Logs and Gain Hidden Access
20
Aug
2025

Copilot Vulnerability Lets Attackers Bypass Audit Logs and Gain Hidden Access

A critical vulnerability in Microsoft’s M365 Copilot allowed users to access sensitive files without leaving any trace in audit logs,…

Redefining Cybersecurity In The Age Of Autonomous Agents
20
Aug
2025

Combating the $10 Trillion Cybercrime Business

20 Aug Combating the $10 Trillion Cybercrime Business Posted at 08:41h in Blogs by Taylor Fox This week in cybersecurity…

Interview: David Walmsley, chief digital and technology officer, Pandora
20
Aug
2025

Interview: David Walmsley, chief digital and technology officer, Pandora

David Walmsley, chief digital and technology officer at jewellery retailer Pandora, is reflecting on four years of sparkling progress. His…

Decoding The Chrome CVE‑2025‑9132 V8 Vulnerability
20
Aug
2025

Decoding The Chrome CVE‑2025‑9132 V8 Vulnerability

The Hong Kong Computer Emergency Response Team Coordination Center issued an alert regarding a remote code execution flaw in Google…

Copilot Vulnerability Breaks Audit Logs and Access Files Secretly for Hackers
20
Aug
2025

Copilot Vulnerability Breaks Audit Logs and Access Files Secretly for Hackers

A significant security vulnerability has been discovered in Microsoft’s Copilot for M365 that allowed users, including potential malicious insiders, to…

Legitimate Chrome VPN with 100K+ Installs Secretly Captures Screenshots and Exfiltrates Sensitive Data
20
Aug
2025

Legitimate Chrome VPN with 100K+ Installs Secretly Captures Screenshots and Exfiltrates Sensitive Data

A Chrome extension marketed as FreeVPN.One, boasting over 100,000 installations, a verified badge, and featured placement in the Chrome Web…

Discover and Control Shadow AI Agents in Your Enterprise Before Hackers Do
20
Aug
2025

Discover and Control Shadow AI Agents in Your Enterprise Before Hackers Do

Aug 20, 2025The Hacker NewsArtificial Intelligence / Enterprise Security Do you know how many AI agents are running inside your…