Windows
20
Aug
2025

Microsoft reportedly fixing SSD failures caused by Windows updates

Recently released Windows 11 24H2 updates are reportedly causing data corruption and failure issues for some SSD and HDD models…

Threat Actors Leverage GenAI Platforms to Create Realistic Phishing Content
20
Aug
2025

Threat Actors Leverage GenAI Platforms to Create Realistic Phishing Content

Cybercriminals are increasingly exploiting generative artificial intelligence platforms to orchestrate sophisticated phishing campaigns that pose unprecedented challenges to traditional security…

Microsoft Issues Emergency Patch for Windows Reset and Recovery Bug
20
Aug
2025

Microsoft Issues Emergency Patch for Windows Reset and Recovery Bug

Microsoft has released an emergency out-of-band security update to address a critical issue affecting Windows reset and recovery operations across…

AI Website Builder Lovable Abused for Phishing and Malware Scams
20
Aug
2025

AI Website Builder Lovable Abused for Phishing and Malware Scams

Scammers have been spotted abusing AI site builder Lovable to mimic trusted brands, steal credentials, drain crypto wallets, and spread…

Metropolitan Police contract with Fujitsu is ‘potential conflict of interest’ amid Post Office probe
20
Aug
2025

Metropolitan Police contract with Fujitsu is ‘potential conflict of interest’ amid Post Office probe

Nationwide police investigation into Fujitsu’s role in the Post Office scandal faces conflict of interest challenges, due to the IT…

RingReaper Malware Attacking Linux Servers Evading EDR Solutions
20
Aug
2025

RingReaper Malware Attacking Linux Servers Evading EDR Solutions

A sophisticated new malware strain targeting Linux environments has emerged, demonstrating advanced evasion capabilities that challenge traditional endpoint detection and…

Lenovo AI Chatbot Flaw Allows Remote Script Execution on Corporate Systems
20
Aug
2025

Lenovo AI Chatbot Flaw Allows Remote Script Execution on Corporate Systems

Cybersecurity researchers have uncovered critical vulnerabilities in Lenovo’s AI-powered customer support chatbot that could allow attackers to execute malicious scripts…

How to Automate Phishing Detection to Prevent Data Theft
20
Aug
2025

How to Automate Phishing Detection to Prevent Data Theft

Phishing is no longer about badly written emails asking you to “click here.” Today’s attacks are business-grade, powered by AI…

Exploit for critical SAP Netweaver flaws released (CVE-2025-31324, CVE-2025-42999)
20
Aug
2025

Exploit for critical SAP Netweaver flaws released (CVE-2025-31324, CVE-2025-42999)

A working exploit concatenating two critical SAP Netweaver vulnerabilities (CVE-2025-31324, CVE-2025-42999) that have been previously exploited in the wild has…

Turning BIA Insights Into Resilient Recovery
20
Aug
2025

Turning BIA Insights Into Resilient Recovery

Modern businesses face a rapidly evolving and expanding threat landscape, but what does this mean for your business? It means…

The U.S. should bolster investment reviews to combat China
20
Aug
2025

The U.S. should bolster investment reviews to combat China

The Committee on Foreign Investment in the United States just published its 2024 report, revealing once again that shielding U.S….

Scaly Wolf Attacking Organizations to Uncover Organizations' Secrets
20
Aug
2025

Scaly Wolf Attacking Organizations to Uncover Organizations’ Secrets

The cybersecurity landscape continues to witness sophisticated threat actors developing increasingly complex attack methodologies to infiltrate organizational networks and steal…