Pure Enterprise Data Cloud bundles its IP for business outcomes
18
Jun
2025

Pure Enterprise Data Cloud bundles its IP for business outcomes

Pure Storage has launched Enterprise Data Cloud (EDC), which knits together several existing elements in its offering to provide enhanced…

System Admins Beware! Weaponized Putty Ads in Bing Deliver Ransomware Downloads
18
Jun
2025

System Admins Beware! Weaponized Putty Ads in Bing Deliver Ransomware Downloads

Cybersecurity experts are sounding the alarm about a sophisticated malware campaign that leverages malicious advertisements targeting system administrators through weaponized…

RapperBot Botnet Surges with 50,000+ Attacks Targeting Network Edge Devices
18
Jun
2025

RapperBot Botnet Surges with 50,000+ Attacks Targeting Network Edge Devices

The RapperBot botnet has resurfaced with unprecedented aggression, targeting network edge devices in a staggering series of over 50,000 attacks….

Jumio Liveness Premium combats deepfakes and injection attacks
18
Jun
2025

Jumio Liveness Premium combats deepfakes and injection attacks

Jumio launched Jumio Liveness Premium with advanced deepfake detection, the company’s most advanced biometric liveness detection solution to date. Jumio’s…

Multi-Stage Malware Campaign
18
Jun
2025

Water Curse Employs 76 GitHub Accounts to Deliver Multi-Stage Malware Campaign

Cybersecurity researchers have exposed a previously unknown threat actor known as Water Curse that relies on weaponized GitHub repositories to…

Workday UK head Dan Pell: Managing AI agents requires system of record
18
Jun
2025

Workday UK head Dan Pell: Managing AI agents requires system of record

Dan Pell is the general manager of Workday in the UK and Ireland, with a background at Salesforce and Microsoft,…

CVE-2023-0386
18
Jun
2025

CISA Warns Of CVE-2023-0386 Linux Kernel Exploitation

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is warning about the active exploitation of a critical Linux kernel vulnerability,…

U.S. CISA adds Linux Kernel flaw to its Known Exploited Vulnerabilities catalog
18
Jun
2025

U.S. CISA adds Linux Kernel flaw to its Known Exploited Vulnerabilities catalog

U.S. CISA adds Linux Kernel flaw to its Known Exploited Vulnerabilities catalog Pierluigi Paganini June 18, 2025 U.S. Cybersecurity and Infrastructure…

DMV-Themed Phishing Attacks Targeting U.S. Citizens to Steal Sensitive Data
18
Jun
2025

DMV-Themed Phishing Attacks Targeting U.S. Citizens to Steal Sensitive Data

A sophisticated phishing campaign targeting American citizens has emerged, exploiting the trusted reputation of state Departments of Motor Vehicles to…

DMV-Style Phishing Scams Target U.S. Citizens to Harvest Sensitive Information
18
Jun
2025

DMV-Style Phishing Scams Target U.S. Citizens to Harvest Sensitive Information

A highly coordinated phishing campaign surfaced, targeting U.S. citizens by impersonating various state Departments of Motor Vehicles (DMVs). This widespread…

WormGPT Makes a Comeback Using Jailbroken Grok and Mixtral Models
18
Jun
2025

WormGPT Makes a Comeback Using Jailbroken Grok and Mixtral Models

Despite its reported shutdown in 2023, the WormGPT a type of uncensored artificial intelligence (AI) tool for illegal acts, is…

Chaining two LPEs to get "root": Most Linux distros vulnerable (CVE-2025-6018, CVE-2025-6019)
18
Jun
2025

Chaining two LPEs to get “root”: Most Linux distros vulnerable (CVE-2025-6018, CVE-2025-6019)

Qualys researchers have unearthed two local privilege escalation vulnerabilities (CVE-2025-6018, CVE-2025-6019) that can be exploited in tandem to achieve root…