Lenovo Protection Driver Vulnerability Let Attackers Escalate Privilege and Execute Arbitrary Code
18
Jul
2025

Lenovo Protection Driver Vulnerability Let Attackers Escalate Privilege and Execute Arbitrary Code

A buffer overflow vulnerability in Lenovo Protection Driver could allow local attackers with elevated privileges to execute arbitrary code on…

Threat Actors Exploit Ivanti Connect Secure Flaws to Deploy Cobalt Strike Beacon
18
Jul
2025

Threat Actors Exploit Ivanti Connect Secure Flaws to Deploy Cobalt Strike Beacon

Threat actors have been actively exploiting vulnerabilities in Ivanti Connect Secure, specifically CVE-2025-0282 and CVE-2025-22457, to deploy advanced malware, including…

CISPE criticised over securing preferential cloud pricing on Microsoft products for members
18
Jul
2025

CISPE criticised over securing preferential cloud pricing on Microsoft products for members

A European trade body is facing criticism for striking a deal with Microsoft that allows its members to host and…

Top US senator calls out supply-chain risk with DoD contractors
18
Jul
2025

Top US senator calls out supply-chain risk with DoD contractors

Listen to the article 2 min This audio is auto-generated. Please let us know if you have feedback. Dive Brief:…

Hand holding a cyber key
18
Jul
2025

New Phobos and 8base ransomware decryptor recover files for free

The Japanese police have released a Phobos and 8-Base ransomware decryptor that lets victims recover their files for free, with…

Microsoft Defender for Office 365 New Dashboard to Provide More Details Across a Range of Threat Vectors
18
Jul
2025

Microsoft Defender for Office 365 New Dashboard to Provide More Details Across a Range of Threat Vectors

Microsoft today announced the rollout of a revamped customer dashboard in Microsoft Defender for Office 365, designed to deliver unprecedented…

How China’s Patriotic ‘Honkers’ Became the Nation’s Elite Cyber Spies
18
Jul
2025

How China’s Patriotic ‘Honkers’ Became the Nation’s Elite Cyber Spies

Topsec and Venustech were two firms alleged to have assisted these efforts. Topsec employed a number of former Honkers, including…

Microsoft Defender for Office 365 Gets Enhanced Threat Dashboard
18
Jul
2025

Microsoft Defender for Office 365 Gets Enhanced Threat Dashboard

Microsoft has announced significant transparency improvements for its email security platform, introducing a new customer-facing dashboard that provides detailed visibility…

UNC3886, Critical Infrastructure, Singapore, Singapore Critical Infrastructure, National Security
18
Jul
2025

‘UNC3886 Is Attacking Our Critical Infrastructure Right Now’

In a rare and urgent late-night address, a senior Singapore official confirmed that the country is currently facing a sophisticated…

Hacker starting at a smartphone
18
Jul
2025

Hackers scanning for TeleMessage Signal clone flaw exposing passwords

Researchers are seeing exploitation attempts for the CVE-2025-48927 vulnerability in the TeleMessage SGNL app, which allows retrieving usernames, passwords, and…

Sophos Intercept X for Windows Vulnerabilities Enable Arbitrary Code Execution
18
Jul
2025

Sophos Intercept X for Windows Vulnerabilities Enable Arbitrary Code Execution

Three critical vulnerabilities in the Sophos Intercept X for Windows product family could allow local attackers to achieve arbitrary code…

Grafana Flaws Allow User Redirection and Code Execution in Dashboards
18
Jul
2025

Grafana Flaws Allow User Redirection and Code Execution in Dashboards

Grafana Labs has released critical security patches addressing two significant vulnerabilities that could enable attackers to redirect users to malicious…