Weaponized RAR Files Deliver VShell Backdoor on Linux Systems
22
Aug
2025

Weaponized RAR Files Deliver VShell Backdoor on Linux Systems

Trellix Advanced Research Center has exposed an infection chain that weaponises nothing more than a filename to compromise Linux hosts….

Interpol operation seizes $97 million in African cybercrime sweep
22
Aug
2025

Interpol operation seizes $97 million in African cybercrime sweep

Authorities in Africa have arrested 1,209 people in an Interpol-led crackdown on cybercrime that targeted nearly 88,000 victims. 11,432 malicious…

Former developer jailed after deploying kill-switch malware at Ohio firm
22
Aug
2025

Former developer jailed after deploying kill-switch malware at Ohio firm

Former developer jailed after deploying kill-switch malware at Ohio firm Pierluigi Paganini August 22, 2025 Ex-developer jailed 4 years for…

22
Aug
2025

China cracks down on fake medical advice with new rules for health influencers

Chinese authorities have announced new rules targeting the rapid expansion of medical science accounts on social media and other unofficial…

New Linux Malware With Weaponized RAR Archive Deploys VShell Backdoor
22
Aug
2025

New Linux Malware With Weaponized RAR Archive Deploys VShell Backdoor

Linux environments, long considered bastions of security, are facing a sophisticated new threat that challenges traditional assumptions about operating system…

Azure Default API Connection Flaw Enables Full Cross-Tenant Compromise
22
Aug
2025

Azure Default API Connection Flaw Enables Full Cross-Tenant Compromise

A critical security vulnerability in Microsoft Azure’s API Connection architecture has been discovered that could allow attackers to completely compromise…

Kelly Benefits December data breach impacted over 400,000 individuals
22
Aug
2025

Orange Belgium July data breach impacted 850,000 customers

Orange Belgium July data breach impacted 850,000 customers Pierluigi Paganini August 22, 2025 Orange Belgium revealed that a July attack…

Why organizations are turning to rapid, trustworthy MDR
22
Aug
2025

Why organizations are turning to rapid, trustworthy MDR

How top-tier managed detection and response (MDR) can help organizations stay ahead of increasingly agile and determined adversaries 19 Aug…

Colt Confirms Ransomware Attack Resulted in Customer Data Theft
22
Aug
2025

Colt Confirms Ransomware Attack Resulted in Customer Data Theft

Industrial technology company Colt has confirmed that a recent ransomware attack on its business support systems resulted in the theft…

CISA Warns Of ICS Vulnerabilities In Siemens, Tigo, EG4
22
Aug
2025

CISA Warns Of ICS Vulnerabilities In Siemens, Tigo, EG4

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) have released four new Industrial Control Systems (ICS) advisories. These advisories expose…

U.S. CISA adds Trend Micro Apex One flaw to its Known Exploited Vulnerabilities catalog
22
Aug
2025

U.S. CISA adds Apple iOS, iPadOS, and macOS flaw to its Known Exploited Vulnerabilities catalog

U.S. CISA adds Apple iOS, iPadOS, and macOS flaw to its Known Exploited Vulnerabilities catalog Pierluigi Paganini August 22, 2025 U.S….

‘What happens online stays online’ and other cyberbullying myths, debunked
22
Aug
2025

‘What happens online stays online’ and other cyberbullying myths, debunked

Separating truth from fiction is the first step towards making better parenting decisions. Let’s puncture some of the most common…