UAE's cybercrime problem laid bare
16
Jul
2025

UAE’s cybercrime issue uncovered

In his role as risk officer for Visa in Central Europe, the Middle East, and Africa, Charles Lobo leads the…

DShield Honeypot Scanning Reaches Record-High
16
Jul
2025

DShield Honeypot Scanning Reaches Record-High

The cybersecurity landscape has witnessed an unprecedented surge in malicious scanning activity, with DShield honeypots recording over one million log…

Former U.S. Army Member Pleads Guilty in Telecom Hacking Case
16
Jul
2025

Former U.S. Army Member Pleads Guilty in Telecom Hacking Case

A 21-year-old former U.S. Army soldier has pleaded guilty to participating in a sophisticated cybercrime operation that targeted telecommunications companies…

Vulnerability Research
16
Jul
2025

NCSC Vulnerability Research Enhances UK Cyber Resilience

The UK’s National Cyber Security Centre (NCSC) has taken proactive steps to deepen its understanding of security vulnerabilities and improve…

VMware ESXi and Workstation Vulnerabilities Let Attackers Execute Malicious Code on Host
16
Jul
2025

VMware ESXi and Workstation Vulnerabilities Let Attackers Execute Malicious Code on Host

Multiple severe vulnerabilities have been addressed affecting VMware ESXi, Workstation, Fusion, and Tools that could allow attackers to execute malicious…

VMware ESXi and Workstation Vulnerabilities Allow Host-Level Code Execution
16
Jul
2025

VMware ESXi and Workstation Vulnerabilities Allow Host-Level Code Execution

Broadcom disclosed four critical vulnerabilities in VMware’s virtualization suite on July 15, 2025, enabling attackers to escape virtual machines and…

Experts unpack the biggest cybersecurity surprises of 2025
16
Jul
2025

Experts unpack the biggest cybersecurity surprises of 2025

2025 has been a busy year for cybersecurity. From unexpected attacks to new tactics by threat groups, a lot has…

Octalyn Stealer Steals VPN Configurations, Passwords and Cookies in Structured Folders
16
Jul
2025

Octalyn Stealer Steals VPN Configurations, Passwords and Cookies in Structured Folders

A sophisticated new credential stealer disguised as a legitimate forensic toolkit has emerged on GitHub, targeting sensitive user data including…

Node.js Vulnerabilities Leave Windows Apps Vulnerable to Path Traversal and HashDoS
16
Jul
2025

Node.js Vulnerabilities Leave Windows Apps Vulnerable to Path Traversal and HashDoS

The Node.js project has released critical security updates across multiple release lines to address two high-severity vulnerabilities that pose significant…

Product showcase: Enzoic for Active Directory
16
Jul
2025

Product showcase: Enzoic for Active Directory

Enzoic for Active Directory is an easy-to-install plugin that integrates with Microsoft Active Directory (AD) to set, monitor, and remediate…

17,000+ Fake News Websites Caught Promoting Investment Frauds
16
Jul
2025

17,000+ Fake News Websites Caught Promoting Investment Frauds

A massive network of fraudulent news websites has been uncovered, with cybersecurity researchers identifying over 17,000 Baiting News Sites (BNS)…

Falco: Open-source cloud-native runtime security tool for Linux
16
Jul
2025

Falco: Open-source cloud-native runtime security tool for Linux

Falco is an open-source runtime security tool for Linux systems, built for cloud-native environments. It monitors the system in real…