A critical security vulnerability has been discovered in the popular Axios HTTP client library that allows attackers to crash Node.js…
Backdoor malware is a covert type of malicious software designed to bypass standard authentication mechanisms and provide persistent, unauthorized access…
Cloud block storage allows organisations to run applications that depend on high throughput and low latency in the cloud. The…
UK train operator LNER (London North Eastern Railway) discloses a data breach Pierluigi Paganini September 12, 2025 LNER warns of…
Samsung has patched a remote code execution vulnerability that was exploited in zero-day attacks targeting its Android devices. Tracked as…
A new, sophisticated malware campaign has been uncovered that leverages Microsoft’s Azure Functions for its command-and-control (C2) infrastructure, a novel…
Recent threat campaigns have revealed an evolving use of BAT-based loaders to deliver Remote Access Trojans (RATs), including XWorm and…
The security landscape for cloud-native applications is undergoing a profound transformation. Containers, Kubernetes, and serverless technologies are now the default…
Fujitsu’s Horizon system continues to produce erratic figures in branch accounts, which the Post Office can’t explain, with millions of…
Apple issues spyware warnings as CERT-FR confirms attacks Pierluigi Paganini September 12, 2025 Apple warned users of a spyware campaign;…
Microsoft has addressed four elevation of privilege vulnerabilities in its Windows Defender Firewall service, all rated as “Important” in severity….
In a striking evolution of its tactics, the Sidewinder advanced persistent threat (APT) group—also known as APT-C-24 or “Rattlesnake”—has adopted…











