Critical HashiCorp Vulnerability Execute Arbitrary Code on Underlying Host
04
Aug
2025

Critical HashiCorp Vulnerability Execute Arbitrary Code on Underlying Host

A critical HashiCorp security vulnerability affecting Vault Community Edition and Enterprise versions could allow privileged operators to execute arbitrary code…

North Korea Hiding Malware Within JPEG Files to Attack Windows Systems Bypassing Detections
04
Aug
2025

North Korea Hiding Malware Within JPEG Files to Attack Windows Systems Bypassing Detections

Security researchers at Genians Security Center have uncovered a sophisticated new variant of the RoKRAT malware, attributed to the North…

Interview: How ITSM helps deliver results at McLaren Racing
04
Aug
2025

Interview: How ITSM helps deliver results at McLaren Racing

The Formula 1 (F1) teams at had a two-week break before heading to Circuit de Spa-Francorchamps (Spa) for the Belgium…

Nation-state group CL-STA-0969 targeted Southeast Asian telecoms in 2024
04
Aug
2025

Nation-state group CL-STA-0969 targeted Southeast Asian telecoms in 2024

Nation-state group CL-STA-0969 targeted Southeast Asian telecoms in 2024 Pierluigi Paganini August 04, 2025 State-backed group CL-STA-0969 hit Southeast Asian…

AI-Powered Code Editor Cursor IDE Vulnerability Enables Remote Code Without User Interaction
04
Aug
2025

AI-Powered Code Editor Cursor IDE Vulnerability Enables Remote Code Without User Interaction

A severe vulnerability in the popular AI-powered code editor Cursor IDE, dubbed “CurXecute,” allows attackers to execute arbitrary code on…

Lovense flaws expose emails and allow account takeover
04
Aug
2025

Lovense flaws expose emails and allow account takeover

Lovense flaws expose emails and allow account takeover Pierluigi Paganini August 04, 2025 Lovense fixed bugs exposing emails and allowing…

Vulnerabilities in Government-Linked Partner Software Allow Remote Code Attacks
04
Aug
2025

Vulnerabilities in Government-Linked Partner Software Allow Remote Code Attacks

Multiple serious security vulnerabilities have been discovered in Partner Software and Partner Web applications widely used by government agencies and…

Gartner: What to look for in a customer data platform
04
Aug
2025

Gartner: What to look for in a customer data platform

Customer data platforms (CDPs) first gained popularity among marketing users as the technology tackled the marketing function’s complex customer data…

APT37 Hackers Weaponizes JPEG Files to Attack Windows System Leveraging "mspaint.exe" File
04
Aug
2025

APT37 Hackers Weaponizes JPEG Files to Attack Windows System Leveraging “mspaint.exe” File

A sophisticated new wave of cyberattacks attributed to North Korea’s notorious APT37 (Reaper) group is leveraging advanced malware hidden within…

NestJS Vulnerability Allows Code Execution on Developer Machines
04
Aug
2025

NestJS Vulnerability Allows Code Execution on Developer Machines

A critical remote code execution vulnerability has been discovered in the popular NestJS framework that could allow attackers to execute…

week in security
04
Aug
2025

A week in security (July 28 – August 3)

August 1, 2025 – OpenAI removed a short-lived experiment that allowed ChatGPT users to make their conversations discoverable by search…

PlayPraetor Android Trojan Infects 11,000+ Devices via Fake Google Play Pages and Meta Ads
04
Aug
2025

PlayPraetor Android Trojan Infects 11,000+ Devices via Fake Google Play Pages and Meta Ads

Cybersecurity researchers have discovered a nascent Android remote access trojan (RAT) called PlayPraetor that has infected more than 11,000 devices,…