Critical Vulnerability in Carmaker Portal Allows Hackers to Unlock Cars Remotely
12
Aug
2025

Critical Vulnerability in Carmaker Portal Allows Hackers to Unlock Cars Remotely

Security researcher Eaton Zveare unveiled a critical flaw in a major automaker’s dealer portal that could allow attackers to unlock…

DarkBit Hackers Attacking Vmware ESXi Servers to Deploy Ransomware and Encrypt VMDK Files
12
Aug
2025

DarkBit Hackers Attacking Vmware ESXi Servers to Deploy Ransomware and Encrypt VMDK Files

A newly discovered ransomware campaign has targeted enterprise VMware ESXi environments with military precision, deploying custom-built encryption tools that specifically…

DarkBit Hackers Target VMware ESXi Servers to Deploy Ransomware and Encrypt VMDK Files
12
Aug
2025

DarkBit Hackers Target VMware ESXi Servers to Deploy Ransomware and Encrypt VMDK Files

A sophisticated ransomware attack by a previously unknown cybercriminal group called “DarkBit” has targeted a major organization’s VMware ESXi infrastructure,…

Cybersecurity jobs available right now: August 12, 2025
12
Aug
2025

Cybersecurity jobs available right now: August 12, 2025

Cloud Platforms Engineering Manager Mozn | UAE | Remote – View job details As a Cloud Platforms Engineering Manager, you…

FBI Busts $100M Romance Scam, Ghana Men Face U.S. Charges
12
Aug
2025

FBI Busts $100M Romance Scam, Ghana Men Face U.S. Charges

The U.S. authorities have secured the extradition of three Ghanaian nationals accused of running a fraud operation that stole over…

NBN Co weaves AI and automation into its operational
12
Aug
2025

NBN Co weaves AI and automation into its operational “fabric”

NBN Co is embedding AI and automation “into the fabric of [its] operations”, with tools already live for design, support…

Hackers Using ClickFix Technique to Attack Windows Machine and Execute Powershell Commands
12
Aug
2025

Hackers Using ClickFix Technique to Attack Windows Machine and Execute Powershell Commands

A sophisticated new attack campaign has emerged targeting Israeli businesses and infrastructure sectors through a deceptive social engineering technique known…

Apache bRPC Vulnerability Lets Attackers Crash Services Remotely via Network
12
Aug
2025

Apache bRPC Vulnerability Lets Attackers Crash Services Remotely via Network

A critical security vulnerability has been discovered in Apache bRPC that allows attackers to remotely crash services through network-based denial…

EntraGoat: Vulnerable Microsoft Entra ID infrastructure to simulate identity security misconfigurations
12
Aug
2025

EntraGoat: Vulnerable Microsoft Entra ID infrastructure to simulate identity security misconfigurations

EntraGoat is a purpose-built tool that sets up a vulnerable Microsoft Entra ID environment to mimic real-world identity security issues….

"Shade BIOS" stealth malware hides below operating system
12
Aug
2025

“Shade BIOS” stealth malware hides below operating system

Attackers can create persistent malware that hides below a computer’s operating system, making it effectively invisible to endpoint detection and…

NCSC Warns of Citrix Netscaler Vulnerability CVE-2025-6543 Exploited to Breach Orgs
12
Aug
2025

NCSC Warns of Citrix Netscaler Vulnerability CVE-2025-6543 Exploited to Breach Orgs

The Dutch National Cyber Security Centre (NCSC-NL) has issued an urgent warning about sophisticated cyberattacks targeting critical infrastructure through a…

Why DNS threats should be on every CISO's radar in 2025
12
Aug
2025

Why DNS threats should be on every CISO’s radar in 2025

DNS is once again in the crosshairs of threat actors. According to the 2025 DNS Threat Landscape Report by Infoblox,…