What’s the latest with retail mobile apps?
18
Jul
2025

Is history repeating itself with the government’s push to open public sector cloud deals to SMEs?

The UK government is on a mission to loosen the grip that legacy IT suppliers have on public sector IT…

UK sanctions Russian hackers, spies as US weighs its own punishments for Russia
18
Jul
2025

UK sanctions Russian hackers, spies as US weighs its own punishments for Russia

As the U.S. government contemplates additional sanctions on Moscow, the United Kingdom went ahead and levied its own Friday against…

Fancy Bear Hackers Attacking Governments, Military Entities With New Sophisticated Tools
18
Jul
2025

Fancy Bear Hackers Attacking Governments, Military Entities With New Sophisticated Tools

The notorious Russian cyberespionage group Fancy Bear, also known as APT28, has intensified its operations against governments and military entities…

Google Sues BadBox 2.0 Botnet Operators Behind 10 Million+ Infected Devices
18
Jul
2025

Google Sues BadBox 2.0 Botnet Operators Behind 10 Million+ Infected Devices

Google has initiated legal proceedings against the operators of BadBox 2.0, identified as the largest botnet comprising internet-connected televisions and…

Threat Actors Exploiting Ivanti Connect Secure Vulnerabilities to Deploy Cobalt Strike Beacon
18
Jul
2025

Threat Actors Exploiting Ivanti Connect Secure Vulnerabilities to Deploy Cobalt Strike Beacon

A sophisticated malware campaign targeting Ivanti Connect Secure VPN devices has been actively exploiting critical vulnerabilities CVE-2025-0282 and CVE-2025-22457 since…

Sophos Intercept X for Windows Flaws Enable Arbitrary Code Execution
18
Jul
2025

Sophos Intercept X for Windows Flaws Enable Arbitrary Code Execution

Sophos has disclosed three critical security vulnerabilities in its Intercept X for Windows endpoint security solution that could allow attackers…

Why IT Leaders Must Rethink Backup in the Age of Ransomware
18
Jul
2025

Why IT Leaders Must Rethink Backup in the Age of Ransomware

With IT outages and disruptions escalating, IT teams are shifting their focus beyond simply backing up data to maintaining operations…

Peer warns IT suppliers against partnering with Fujitsu in government contracts
18
Jul
2025

Peer warns IT suppliers against partnering with Fujitsu in government contracts

Peer James Arbuthnot warned suppliers to “think twice” before partnering with Fujitsu on government contracts, to avoid being “tarred by…

Ubiquiti UniFi Devices Vulnerability Allows Attackers to Inject Malicious Commands
18
Jul
2025

Ubiquiti UniFi Devices Vulnerability Allows Attackers to Inject Malicious Commands

A critical security vulnerability affecting multiple Ubiquiti UniFi Access devices could allow attackers to execute malicious commands remotely.  The vulnerability,…

New QR Code Attacks Through PDFs Bypass Detection and Steal Credentials
18
Jul
2025

New QR Code Attacks Through PDFs Bypass Detection and Steal Credentials

Researchers at Cyble Research and Intelligence Labs (CRIL) have uncovered an ongoing quishing campaign dubbed “Scanception,” which exploits QR code-based…

Back To Basics For Every Employee
18
Jul
2025

Cybersecurity Growth Stocks In The Second Half Of 2025

Investors seeking robust growth in the second half of 2025 and beyond should consider the cybersecurity industry. Not only is the…

CERT-UA Discovers LAMEHUG Malware Linked to APT28, Using LLM for Phishing Campaign
18
Jul
2025

CERT-UA Discovers LAMEHUG Malware Linked to APT28, Using LLM for Phishing Campaign

Jul 18, 2025Ravie LakshmananCyber Attack / Malware The Computer Emergency Response Team of Ukraine (CERT-UA) has disclosed details of a…