UK IT infrastructure processes images looking back 1.2 million light years
26
Jun
2025

UK IT infrastructure processes images looking back 1.2 million light years

UK astronomers and software developers have created an infrastructure to process and distribute petabytes (PB) of information from a digital…

Cybercriminals Exploit LLM Models to Enhance Hacking Activities
26
Jun
2025

Cybercriminals Exploit LLM Models to Enhance Hacking Activities

Cybercriminals are increasingly leveraging large language models (LLMs) to amplify their hacking operations, utilizing both uncensored versions of these AI…

Outlook
26
Jun
2025

Microsoft fixes Outlook bug causing crashes when opening emails

Microsoft has fixed a known issue that will cause the classic Outlook email client to crash when opening emails or…

Chinese Hackers Deploy Pubload Malware Using Tibetan Community Lures and Weaponized Filenames
26
Jun
2025

Chinese Hackers Deploy Pubload Malware Using Tibetan Community Lures and Weaponized Filenames

IBM X-Force researchers have uncovered a series of targeted cyberattacks orchestrated by the China-aligned threat actor Hive0154. Throughout 2025, this…

Google Chrome
26
Jun
2025

Microsoft confirms Family Safety blocks Google Chrome from launching

Microsoft has confirmed that its Family Safety parental control service is blocking users from launching Google Chrome and other web browsers…

Cybercriminals Use TeamFiltration Pentesting Framework to Breach Microsoft Teams, OneDrive, Outlook, and More
26
Jun
2025

Cybercriminals Use TeamFiltration Pentesting Framework to Breach Microsoft Teams, OneDrive, Outlook, and More

Proofpoint threat researchers have exposed an active account takeover (ATO) campaign, dubbed UNK_SneakyStrike, exploiting the TeamFiltration pentesting framework to target…

BreachForums: ShinyHunters Members Arrested, IntelBroker Identified as Kai West
26
Jun
2025

ShinyHunters Members Arrested, IntelBroker Identified as Kai West

In a major development against global cybercrime, French authorities have apprehended several key individuals believed to be instrumental in operating…

Embed's agentic security platform triages and investigates security alerts
26
Jun
2025

Embed’s agentic security platform triages and investigates security alerts

Embed Security unveiled its agentic security platform that autonomously triages and investigates alerts, empowering detection and response teams to focus…

AI-Powered Phishing Attacks
26
Jun
2025

Iranian APT35 Hackers Targeting Israeli Tech Experts with AI-Powered Phishing Attacks

Jun 26, 2025Ravie LakshmananCyber Espionage / Malware An Iranian state-sponsored hacking group associated with the Islamic Revolutionary Guard Corps (IRGC)…

U.S. CISA adds Linux Kernel flaw to its Known Exploited Vulnerabilities catalog
26
Jun
2025

U.S. CISA adds AMI MegaRAC SPx, D-Link DIR-859 routers, and Fortinet FortiOS flaws to its Known Exploited Vulnerabilities catalog

U.S. CISA adds AMI MegaRAC SPx, D-Link DIR-859 routers, and Fortinet FortiOS flaws to its Known Exploited Vulnerabilities catalog Pierluigi…

CISA Issues Alert on Active Exploitation of D-Link Path Traversal Flaw
26
Jun
2025

CISA Issues Alert on Active Exploitation of D-Link Path Traversal Flaw

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert following evidence of active exploitation of a…

ClickFix attacks skyrocketing more than 500%
26
Jun
2025

ClickFix attacks skyrocketing more than 500%

ClickFix, a deceptive attack method, saw a surge of more than 500% in the first half of 2025, making it…