Microsoft Entra ID Vulnerability Let Attackers Escalate Privileges
18
Jul
2025

Microsoft Entra ID Vulnerability Let Attackers Escalate Privileges

A critical vulnerability in Microsoft Entra ID allows attackers to escalate privileges to the Global Administrator role through the exploitation…

Signal App Clone Vulnerability Actively Exploited for Password Theft
18
Jul
2025

Signal App Clone Vulnerability Actively Exploited for Password Theft

A critical vulnerability in TeleMessageTM SGNL, an enterprise messaging platform modeled after Signal, is being actively exploited by threat actors…

Making security and development co-owners of DevSecOps
18
Jul
2025

Making security and development co-owners of DevSecOps

In this Help Net Security interview, Galal Ibrahim Maghola, former Head of Cybersecurity at G42 Company, discusses strategic approaches to…

Thailand Ministry of Labour cyberattack Minister
18
Jul
2025

Thailand Ministry Of Labour Cyberattack Confirmed

Thailand Ministry of Labour cyberattack has intensified as new revelations came which indicates that a planned data breach impacted the…

Hackers Abuse DNS Blind Spots to Stealthily Deliver Malware
18
Jul
2025

Hackers Abuse DNS Blind Spots to Stealthily Deliver Malware

Cybersecurity researchers have uncovered a sophisticated technique where threat actors are exploiting DNS infrastructure to covertly store and distribute malware,…

AI adoption is booming but secure scaling not so much
18
Jul
2025

AI adoption is booming but secure scaling not so much

96% of organizations are deploying AI models, and virtually no organization can move into the future without considering how ML…

Threat Intelligence Platforms in ANZ
18
Jul
2025

Top 10 Threat Intelligence Platforms In ANZ (2025 Edition)

The ANZ (Australia and New Zealand) region has long been plagued by cyber threats that have targeted the nations for…

Backdoor discovered to SonicWall Secure Mobile Access
18
Jul
2025

Backdoor discovered to SonicWall Secure Mobile Access

Google Threat Intelligence Group (GTIG) has published new research that uncovers a previously unknown backdoor that threat actors are deploying…

Buy Now, Pay Later... with your data
18
Jul
2025

Buy Now, Pay Later… with your data

Buy Now, Pay Later (BNPL) apps are everywhere these days. Whether you’re buying sneakers or groceries, chances are you’ve seen…

Chinese Threat Actors Target Taiwan’s Semiconductor Industry
18
Jul
2025

Chinese Threat Actors Target Taiwan’s Semiconductor Industry

Researchers from cybersecurity company Proofpoint have released new insights uncovering a significant escalation in China-aligned cyber espionage operations targeting Taiwan’s critical semiconductor industry….

Australia political parties hit with ransomware attack
18
Jul
2025

Australia political parties hit with ransomware attack

Australia political parties started by mining billionaire Clive Palmer, the United Australia Party, and Trumpets of Patriots have confirmed in a statement on…

Qantas gains interim injunction in the NSW Supreme Court
18
Jul
2025

Qantas gains interim injunction in the NSW Supreme Court

 Following a Qantas contact centre being hit by a ‘significant’ cyber breach, with stolen data including customers’ names, emails, phone numbers,…