AI Website Builder Lovable Abused for Phishing and Malware Scams
20
Aug
2025

AI Website Builder Lovable Abused for Phishing and Malware Scams

Scammers have been spotted abusing AI site builder Lovable to mimic trusted brands, steal credentials, drain crypto wallets, and spread…

Metropolitan Police contract with Fujitsu is ‘potential conflict of interest’ amid Post Office probe
20
Aug
2025

Metropolitan Police contract with Fujitsu is ‘potential conflict of interest’ amid Post Office probe

Nationwide police investigation into Fujitsu’s role in the Post Office scandal faces conflict of interest challenges, due to the IT…

RingReaper Malware Attacking Linux Servers Evading EDR Solutions
20
Aug
2025

RingReaper Malware Attacking Linux Servers Evading EDR Solutions

A sophisticated new malware strain targeting Linux environments has emerged, demonstrating advanced evasion capabilities that challenge traditional endpoint detection and…

Lenovo AI Chatbot Flaw Allows Remote Script Execution on Corporate Systems
20
Aug
2025

Lenovo AI Chatbot Flaw Allows Remote Script Execution on Corporate Systems

Cybersecurity researchers have uncovered critical vulnerabilities in Lenovo’s AI-powered customer support chatbot that could allow attackers to execute malicious scripts…

How to Automate Phishing Detection to Prevent Data Theft
20
Aug
2025

How to Automate Phishing Detection to Prevent Data Theft

Phishing is no longer about badly written emails asking you to “click here.” Today’s attacks are business-grade, powered by AI…

Exploit for critical SAP Netweaver flaws released (CVE-2025-31324, CVE-2025-42999)
20
Aug
2025

Exploit for critical SAP Netweaver flaws released (CVE-2025-31324, CVE-2025-42999)

A working exploit concatenating two critical SAP Netweaver vulnerabilities (CVE-2025-31324, CVE-2025-42999) that have been previously exploited in the wild has…

Turning BIA Insights Into Resilient Recovery
20
Aug
2025

Turning BIA Insights Into Resilient Recovery

Modern businesses face a rapidly evolving and expanding threat landscape, but what does this mean for your business? It means…

The U.S. should bolster investment reviews to combat China
20
Aug
2025

The U.S. should bolster investment reviews to combat China

The Committee on Foreign Investment in the United States just published its 2024 report, revealing once again that shielding U.S….

Scaly Wolf Attacking Organizations to Uncover Organizations' Secrets
20
Aug
2025

Scaly Wolf Attacking Organizations to Uncover Organizations’ Secrets

The cybersecurity landscape continues to witness sophisticated threat actors developing increasingly complex attack methodologies to infiltrate organizational networks and steal…

Hackers Exploit Apache ActiveMQ Flaw to Breach Cloud Linux Servers
20
Aug
2025

Hackers Exploit Apache ActiveMQ Flaw to Breach Cloud Linux Servers

Cybersecurity researchers have uncovered a sophisticated attack campaign where hackers exploiting a critical Apache ActiveMQ vulnerability are taking the unusual…

Cyber contracts not meeting boards' needs: Kaine Mathrick Tech CEO
20
Aug
2025

Cyber contracts not meeting boards’ needs: Kaine Mathrick Tech CEO

Cybersecurity contracts are not keeping pace with boards’ needs, according to Bradley Kaine, CEO of Australian managed service provider Kaine Mathrick…

Google fixed the second actively exploited Chrome zero-day since the start of the year
20
Aug
2025

Google fixed Chrome flaw found by Big Sleep AI

Google fixed Chrome flaw found by Big Sleep AI Pierluigi Paganini August 20, 2025 Google Chrome 139 addressed a high-severity…