Colt Cyberattack Disrupts Services Across Key Platforms
18
Aug
2025

Colt Cyberattack Disrupts Services Across Key Platforms

Colt Technology Services, a major UK-based telecommunications provider, continues to experience service disruptions following a serious cyberattack that began on…

China’s cyberspace regulator summons Nvidia to explain H20 chip’s ‘back-door’ risks
18
Aug
2025

China’s cyberspace regulator summons Nvidia to explain H20 chip’s ‘back-door’ risks

China’s cyberspace regulator has summoned Nvidia to explain whether its H20 chips have any “back-door safety” risks, casting a shadow…

Windows
18
Aug
2025

Recent Windows updates may fail to install via WUSA

Microsoft has mitigated a known issue that caused Windows update failures when installing them from a network share using the…

Critical PostgreSQL Vulnerabilities Allow Arbitrary Code Injection During Restoration
18
Aug
2025

Critical PostgreSQL Vulnerabilities Allow Arbitrary Code Injection During Restoration

The PostgreSQL Global Development Group has issued emergency security updates across all supported versions to address three critical vulnerabilities that…

WarLock Ransomware group Claims Breach at Colt Telecom and Hitachi
18
Aug
2025

WarLock Ransomware group Claims Breach at Colt Telecom and Hitachi

WarLock ransomware claims breach at Colt and Hitachi, with Colt investigating and working to restore systems while experts review the…

Cybersecurity crime losses in Hong Kong up 15% year on year in first half of 2025
18
Aug
2025

Cybersecurity crime losses in Hong Kong up 15% year on year in first half of 2025

Financial losses through cybersecurity crimes in Hong Kong hit HK$3.04 billion (US$387.3 million) in the first half of 2025, marking…

What is Use-After-Free Vulnerability? - Impact and Mitigation
18
Aug
2025

What is Use-After-Free Vulnerability? – Impact and Mitigation

Use-after-free (UAF) vulnerabilities represent one of the most critical and prevalent security threats in modern software systems, particularly affecting applications…

New Ghost-Tapping Attacks Target Apple Pay and Google Pay Users’ Linked Cards
18
Aug
2025

New Ghost-Tapping Attacks Target Apple Pay and Google Pay Users’ Linked Cards

Chinese-speaking cybercriminals are using ghost-tapping techniques to take advantage of Near Field Communication (NFC) relay tactics in a sophisticated evolution…

Wazuh for Regulatory Compliance
18
Aug
2025

Wazuh for Regulatory Compliance

Aug 18, 2025The Hacker NewsData Breach / Regulatory Compliance Organizations handling various forms of sensitive data or personally identifiable information…

Here’s what could happen if CISA 2015 expires next month
18
Aug
2025

Here’s what could happen if CISA 2015 expires next month

Expiration of a 2015 law at the end of September could dramatically reduce cyber threat information sharing within industry, as…

People walk past an Nvidia display advertisement in Taipei during the Computex 2025 trade show on May 19, 2025. Photo: AFP
18
Aug
2025

Chinese semiconductor, AI firms form pact as Nvidia faces inquiry on H20 chip’s security

The alliance reflected the growing efforts in the country’s semiconductor industry and nascent AI sector to push forward Beijing’s tech…

Rockwell ControlLogix Ethernet Vulnerability Let Attackers Execute Remote Code
18
Aug
2025

Rockwell ControlLogix Ethernet Vulnerability Let Attackers Execute Remote Code

A critical security vulnerability has been discovered in Rockwell Automation’s ControlLogix Ethernet communication modules, potentially allowing remote attackers to execute…