Qilin Ransomware Leverages TPwSav.sys Driver to Disable EDR Security Measures
31
Jul
2025

Qilin Ransomware Leverages TPwSav.sys Driver to Disable EDR Security Measures

Cybercriminals have once again demonstrated their evolving sophistication by weaponizing an obscure Toshiba laptop driver to bypass endpoint detection and…

Apple Security Updates & Rapid Security Responses July 2025
31
Jul
2025

Apple Security Updates & Rapid Security Responses July 2025

Apple has rolled out a wide-ranging series of Apple security updates and Rapid Security Responses, spanning iOS, iPadOS, macOS, tvOS,…

Dahua Camera flaws allow remote hacking. Update firmware now
31
Jul
2025

Dahua Camera flaws allow remote hacking. Update firmware now

Dahua Camera flaws allow remote hacking. Update firmware now Pierluigi Paganini July 31, 2025 Critical flaws in Dahua cameras let…

ChatGPT, Gemini, GenAI Tools Vulnerable to Man-in-the-Prompt Attacks
31
Jul
2025

ChatGPT, Gemini, GenAI Tools Vulnerable to Man-in-the-Prompt Attacks

A critical vulnerability affecting popular AI tools, including ChatGPT, Google Gemini, and other generative AI platforms, exposes them to a…

CrushFTP Hit by Critical 0-Day RCE Vulnerability
31
Jul
2025

CrushFTP Hit by Critical 0-Day RCE Vulnerability

Security researchers have disclosed a critical zero-day vulnerability in CrushFTP, a popular file transfer server solution, that allows attackers to…

AI is changing the vCISO game
31
Jul
2025

AI is changing the vCISO game

Virtual CISO (vCISO) services have moved from niche to mainstream, with vCISO services adoption 2025 data showing a more than…

NIST Secure Software DevSecOps Practices Publication
31
Jul
2025

NIST Secure Software DevSecOps Practices Publication

To support the creation of software that is secure against cyber breaches and free of malicious code, the U.S. Department…

New JSCEAL Attack Targeting Crypto App Users To Steal Credentials and Wallets
31
Jul
2025

New JSCEAL Attack Targeting Crypto App Users To Steal Credentials and Wallets

A sophisticated new malware campaign targeting cryptocurrency application users has emerged, leveraging compiled JavaScript files and Node.js to steal digital…

Palo Alto Networks Announces $25 Billion Acquisition of CyberArk
31
Jul
2025

Palo Alto Networks Announces $25 Billion Acquisition of CyberArk

Cybersecurity giant Palo Alto Networks announced a landmark $25 billion acquisition of identity security leader CyberArk on July 30, 2025,…

New AI model offers faster, greener way for vulnerability detection
31
Jul
2025

New AI model offers faster, greener way for vulnerability detection

A team of researchers has developed a new AI model, called White-Basilisk, that detects software vulnerabilities more efficiently than much…

CISA and FBI Shared Tactics, Techniques, and Procedures of Scattered Spider Hacker Group
31
Jul
2025

CISA and FBI Shared Tactics, Techniques, and Procedures of Scattered Spider Hacker Group

The Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI) have released an updated joint cybersecurity advisory…

Hackers Allegedly Breach Nokia’s Internal Network
31
Jul
2025

Hackers Allegedly Breach Nokia’s Internal Network

A cybercriminal group has allegedly infiltrated Nokia’s internal network through a vulnerable third-party contractor, potentially exposing sensitive information belonging to…