Cybercriminals Use Malicious PDFs to Impersonate Microsoft, DocuSign, and Dropbox in Targeted Phishing Attacks
02
Jul
2025

Cybercriminals Use Malicious PDFs to Impersonate Microsoft, DocuSign, and Dropbox in Targeted Phishing Attacks

Cisco’s Talos security team has uncovered a surge in sophisticated phishing campaigns leveraging malicious PDF payloads to impersonate trusted brands…

Nutanix breaks the bounds of HCI again with Pure Storage linkup
02
Jul
2025

Law professor urges CMA to take swift and urgent action over Microsoft cloud licensing

Microsoft’s “harmful” cloud licensing practices need to be swiftly and directly remediated by the Competition and Markets Authority (CMA) to prevent…

Windows 11
02
Jul
2025

Microsoft fixes ‘Print to PDF’ feature broken by Windows update

Microsoft has fixed a known bug that breaks the ‘Print to PDF’ feature on Windows 11 24H2 systems after installing…

CISA Warns of TeleMessage TM SGNL Vulnerabilities Exploited in Attacks
02
Jul
2025

CISA Warns of TeleMessage TM SGNL Vulnerabilities Exploited in Attacks

CISA has issued an urgent warning regarding two critical vulnerabilities in TeleMessage TM SGNL that threat actors are currently exploiting…

New macOS Malware Uses Process Injection and Remote Access to Steal Keychain Credentials
02
Jul
2025

New macOS Malware Uses Process Injection and Remote Access to Steal Keychain Credentials

A sophisticated campaign by North Korean (DPRK)-aligned threat actors targeting Web3 and cryptocurrency businesses has been uncovered, showcasing an alarming…

Shared services in the public sector – is bigger really better?
02
Jul
2025

Shared services in the public sector – is bigger really better?

Back in 2010, when I was working in IT in local government, shared services were hailed as a lifeline. Councils…

Microsoft Exchange
02
Jul
2025

DNS issue blocks delivery of Exchange Online OTP codes

Microsoft is working to fix a DNS misconfiguration that is causing one-time passcode (OTP) message delivery failures in Exchange Online…

Chinese Houken Hackers Exploiting Ivanti CSA Zero-Days to Deploy Linux Rootkits
02
Jul
2025

Chinese Houken Hackers Exploiting Ivanti CSA Zero-Days to Deploy Linux Rootkits

A sophisticated Chinese threat group identified as Houken has been exploiting multiple zero-day vulnerabilities in Ivanti Cloud Service Appliance (CSA)…

YONO SBI Banking App Vulnerability Exposes Users to Man-in-the-Middle Attack
02
Jul
2025

YONO SBI Banking App Vulnerability Exposes Users to Man-in-the-Middle Attack

A critical security flaw has been discovered in the widely used YONO SBI: Banking & Lifestyle app, potentially exposing millions…

Blind Eagle Linked to Russian Host Proton66 in Latin America Attacks
02
Jul
2025

Blind Eagle Linked to Russian Host Proton66 in Latin America Attacks

Trustwave SpiderLabs, a leading cybersecurity research team, has confidently connected the cyber threat group known as Blind Eagle (also called…

George Kurtz On The Genesis Of CrowdStrike: "Salesforce Of Security"
02
Jul
2025

George Kurtz On The Genesis Of CrowdStrike: “Salesforce Of Security”

George Kurtz, CrowdStrike’s founder and CEO, sat down with Cybersecurity Ventures at the RSA Conference USA 2025 in San Francisco…

Dutch study uncovers cognitive biases undermining cyber security board decisions
02
Jul
2025

Dutch study uncovers cognitive biases undermining cyber security board decisions

The traditional traffic light system used by chief information security officers (CISOs) to report cyber risks to boards is showing…