Apache APISIX Vulnerability Enables Cross-Issuer Access Under Misconfigurations
04
Jul
2025

Apache APISIX Vulnerability Enables Cross-Issuer Access Under Misconfigurations

A newly disclosed vulnerability, CVE-2025-46647, has been identified in the openid-connect plugin of Apache APISIX, a widely used open-source API gateway….

NightEagle APT Exploits Microsoft Exchange Flaw to Target China's Military and Tech Sectors
04
Jul
2025

NightEagle APT Exploits Microsoft Exchange Flaw to Target China’s Military and Tech Sectors

Jul 04, 2025Ravie LakshmananZero-Day / Cyber Espionage Cybersecurity researchers have shed light on a previously undocumented threat actor called NightEagle…

Google will pay Texas $1.4 billion over its location tracking practices
04
Jul
2025

Google fined $314M for misusing idle Android users’ data

Google fined $314M for misusing idle Android users’ data Pierluigi Paganini July 04, 2025 Google must pay $314M after a…

Malicious SEO Plugins on WordPress Can Lead to Site Takeover
04
Jul
2025

Malicious SEO Plugins on WordPress Can Lead to Site Takeover

A new wave of cyberattacks is targeting WordPress websites through malicious SEO plugins that can lead to complete site takeover….

Microsoft Investigating Forms Service Issue Not Accessible for Users
04
Jul
2025

Microsoft Investigating Forms Service Issue Not Accessible for Users

Microsoft is currently investigating a significant service disruption affecting Microsoft Forms, leaving numerous users unable to access the popular online…

Instagram Now Rotating TLS Certificates Daily with 1-Week Validity
04
Jul
2025

Instagram Now Rotating TLS Certificates Daily with 1-Week Validity

Instagram has begun rotating its TLS certificates on a daily basis, with each certificate valid for just over a week….

Print Friendly, PDF & Email
04
Jul
2025

Fighting Ransomware w/ William Lyne (National Crime Agency)

We interviewed William Lyne, Head of Cyber Intelligence at the UK National Crime Agency (NCA), on the evolving ransomware ecosystem, the…

Massive Android Ad Fraud 'IconAds' Leverages Google Play to Attack Phone Users
04
Jul
2025

Massive Android Ad Fraud ‘IconAds’ Leverages Google Play to Attack Phone Users

A sophisticated mobile ad fraud operation dubbed “IconAds” has infiltrated Android devices worldwide through 352 malicious applications distributed via Google…

Scattered Spider Enhances Tactics to Exploit Legitimate Tools for Evasion and Persistence
04
Jul
2025

Scattered Spider Enhances Tactics to Exploit Legitimate Tools for Evasion and Persistence

Scattered Spider, also tracked under aliases such as UNC3944, Scatter Swine, and Muddled Libra, has emerged as a formidable financially…

Simplify Onboarding With Hospitality Training Software
04
Jul
2025

Simplify Onboarding With Hospitality Training Software

Effective onboarding is essential in fast-paced hospitality, with high turnover rates and a multitude of expectations as the baseline for…

Multiple PHP Vulnerabilities Allow SQL Injection & DoS Attacks
04
Jul
2025

Multiple PHP Vulnerabilities Allow SQL Injection & DoS Attacks

Critical security vulnerabilities have been discovered in PHP that could allow attackers to execute SQL injection attacks and cause denial…

Writable File in Lenovo Path Lets Attackers Evade AppLocker Restrictions
04
Jul
2025

Writable File in Lenovo Path Lets Attackers Evade AppLocker Restrictions

A security researcher has uncovered a significant vulnerability affecting Lenovo computers: a writable file within the Windows directory that can…