From Bing Search To Ransomware: Bumblebee And Adaptixc2 Deliver Akira
OverviewBumblebee malware has been an initial access tool used by threat actors since late 2021. In 2023 the malware was...
OverviewBumblebee malware has been an initial access tool used by threat actors since late 2021. In 2023 the malware was...
Google will pause non-essential AI workloads to protect power grids, the advertising giant announced on Monday.The web giant already does...
The founder of a German mobile phone repair and insurance biz has begun insolvency proceedings for some operations in his...
Mozilla is warning of an ongoing phishing campaign targeting developers of Firefox add-ons.The browser maker urged devs to "exercise extreme...
More than 4,000 victims across 62 countries have been infected by stealthy infostealers pilfering people's passwords, credit card numbers, and...
Updated Researchers at German infosec services company Nextron Threat have spotted malware that creates a highly-persistent Linux backdoor and said...
Microsoft disconnected Indian company Nayara Energy from its cloudy resources last week, before restoring access ahead of a court clash.This...
Who, Me? Welcome to the opening day of another working week, an occasion The Register always celebrates with a new...
SonicWall on Monday confirmed that it's investigating a rash of ransomware activity targeting its firewall devices, following multiple reports of...
Mozilla is warning of an ongoing phishing campaign targeting developers of Firefox add-ons.The browser maker urged devs to "exercise extreme...
The UK government has reported that an additional five million age checks are being made daily as UK-based internet users...
More than 4,000 victims across 62 countries have been infected by stealthy infostealers pilfering people's passwords, credit card numbers, and...
The founder of a German mobile phone repair and insurance biz has begun insolvency proceedings for some operations in his...
Vulnerability Summary: CVE-2025-51060 An issue was discovered in CPUID cpuz.sys 1.0.5.4. An attacker can use DeviceIoControl with the unvalidated parameters...
Vulnerability Summary: CVE-2025-51857 The reconcile method in the AttachmentReconciler class of the Halo system v.2.20.18LTS and before is vulnerable to...
Vulnerability Summary: CVE-2025-50688 A command injection vulnerability exists in TwistedWeb (version 14.0.0) due to improper input sanitization in the file...
Vulnerability Summary: CVE-2025-51628 Insecure Direct Object Reference (IDOR) vulnerability in PdfHandler component in Agenzia Impresa Eccobook v2.81.1 and below allows...
Vulnerability Summary: CVE-2025-51627 Incorrect access control in CaricaVerbale in Agenzia Impresa Eccobook v2.81.1 allows authenticated attackers with low-level access to...
Vulnerability Summary: CVE-2025-50592 Cross site scripting vulnerability in seacms before 13.2 via the vid parameter to Upload/js/player/dmplayer/player. Affected Endpoints: No...
Vulnerability Summary: CVE-2025-52237 An issue in the component /stl/actions/download?filePath of SSCMS v7.3.1 allows attackers to execute a directory traversal. Affected...
Vulnerability Summary: CVE-2025-45512 A lack of signature verification in the bootloader of DENX Software Engineering Das U-Boot (U-Boot) v1.1.3 allows...
Vulnerability Summary: CVE-2025-8586 A vulnerability, which was classified as problematic, was found in libav up to 12.3. This affects the...
Vulnerability Summary: CVE-2025-52078 File upload vulnerability in Writebot AI Content Generator SaaS React Template thru 4.0.0, allowing remote attackers to...
The Internet of Things (IoT) has revolutionized how we live and work, connecting devices from smart homes to industrial systems....