CVE Alert: CVE-2025-24801
Vulnerability Summary: CVE-2025-24801 GLPI is a free asset and IT management software package. An authenticated user can upload and force...
Vulnerability Summary: CVE-2025-24801 GLPI is a free asset and IT management software package. An authenticated user can upload and force...
Vulnerability Summary: CVE-2025-27080 Vulnerabilities in the command line interface of AOS-CX could allow an authenticated remote attacker to expose sensitive...
In today’s digital world, where cyber threats are evolving rapidly, the integration of artificial intelligence (AI) into cybersecurity practices offers...
A recent supply chain attack has put the secrets of over 23,000 organizations at risk, exposing them through a compromised...
A newly launched security database seeks to empower non-profits and high-risk individuals in navigating online threats and ensuring their digital...
In 2024, UK social media and email account compromises have surged dramatically, leading to losses nearing £1 million. This alarming...
A bipartisan group of US legislators is calling for transparency in the legal conflict between Apple and the UK government...
The digital supply chains of UK companies are notably larger and more complex compared to their global counterparts, posing significant...
A large-scale malicious app campaign is bypassing Android security, leading to over 60 million downloads of harmful applications from the...
The UK's Online Safety Act has equipped Ofcom with new powers to sanction tech platforms for failing to remove illegal...
Cybersecurity researchers have confirmed a critical link between BlackLock and the infamous Eldorado ransomware group, affirming that BlackLock is essentially...
Cloudflare is pioneering post-quantum cryptography (PQC) to protect online communications from future quantum threats, enhancing its Zero Trust platform's security....
Newly leaked chat logs reveal a concerning connection between the BlackBasta ransomware gang and Russian governmental authorities. The recent revelations...
Google's acquisition of Wiz for $32 billion marks a significant leap in cloud security offerings, enhancing its capabilities to support...
A recent study by Specops uncovers prevalent passwords used in attacks on Remote Desktop Protocol (RDP), emphasizing the security risks...
Data breaches have surged by 6% year-on-year, resulting in an alarming 16.8 billion records being exposed in 2024. This increase...
A recent study reveals how GenAI tools can create information-stealing malware. This research, led by Vitaly Simonovich at Cato Networks,...
HIBP In February 2025, the public safety policy management systems company Lexipol suffered a data breach. Attributed to the self-proclaimed...
CISA and FBI Warn of Malicious Cyber Actors Using Buffer Overflow Vulnerabilities to Compromise Software CISA and the Federal Bureau...
CISA Adds One Known Exploited Vulnerability to Catalog CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based...
CISA Releases Two Industrial Control Systems Advisories CISA released two Industrial Control Systems (ICS) advisories on February 11, 2025. These...
CISA Adds Four Known Exploited Vulnerabilities to Catalog CISA has added four vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on...
CISA Adds Two Known Exploited Vulnerabilities to Catalog CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based...
CISA Releases Two Industrial Control Systems Advisories CISA released two Industrial Control Systems (ICS) advisories on February 18, 2025. These...