Microsoft has officially begun rolling out native System Monitor (Sysmon) functionality to Windows 11, marking a significant shift for threat…
A sophisticated cyber-espionage group known as Amaranth-Dragon has launched a series of highly targeted attacks against government and law enforcement…
Senior technology leaders are operating in increasingly complex environments – larger remits, higher accountability and less space to step back…
TP-Link OS Command Injection Vulnerabilities TP-Link has released urgent firmware updates for its Archer BE230 Wi-Fi 7 routers to address…
The Commonwealth Bank of Australia (CBA) has classified artificial intelligence (AI) as a “material risk type” under its risk management…
VMware ESXi 0-day Ransomware Attack The U.S. Cybersecurity and Infrastructure Security Agency (CISA) recently confirmed that ransomware groups are actively…
ANZ Banking Group has switched AI agents in a new Salesforce customer relationship management platform used by its business bankers…
UNICEF Australia has warned that inconsistent action by technology companies is leaving children exposed to online sexual exploitation, following the…
Red teaming has undergone a radical evolution. Modern organizations can no longer rely solely on human creativity or outdated attack…
A threat actor is compromising NGINX servers in a campaign that hijacks user traffic and reroutes it through the attacker’s…
Over the past four years, I have handled numerous international cases involving SkyECC, Ennetcom, EncroChat, and other PGP- or crypto-phone…
CVE-2025-22225 in VMware ESXi now used in active ransomware attacks Pierluigi Paganini February 04, 2026 Ransomware groups now exploit VMware…
