Cybersecurity
-
RondoDox Botnet Updated Their Arsenal
Source: Cyber Security NewsRead more: RondoDox Botnet Updated Their ArsenalThe RondoDox botnet has evolved significantly, increasing its exploitation capabilities by 650%. This botnet now targets a vast array of…
-
The AI revolution fueling the bot epidemic
Source: CIO MagazineRead more: The AI revolution fueling the bot epidemicThe rise of accessible AI technologies is enabling cybercriminals to create and deploy malicious bots at unprecedented scale. These bots,…
-
SAP shakes up its certification process
Source: CIO MagazineRead more: SAP shakes up its certification processSAP is revising its certification process to focus on real-world applications instead of traditional multiple-choice exams. Starting with practical, scenario-based…
-
Critical Vulnerability in Post SMTP Plugin
Source: BleepingComputerRead more: Critical Vulnerability in Post SMTP PluginHackers are exploiting a critical vulnerability in the Post SMTP plugin affecting over 400,000 WordPress sites. This issue allows them…
-
New ‘SleepyDuck’ Malware in Open VSX Marketplace
Source: Cyber Security NewsRead more: New ‘SleepyDuck’ Malware in Open VSX MarketplaceThe SleepyDuck malware, a remote access trojan, targets developers through a disguised Solidity extension in the Open VSX marketplace. It…
-
North Korean companies, people sanctioned for money laundering from cybercrime, IT worker schemes
Source: CyberScoopRead more: North Korean companies, people sanctioned for money laundering from cybercrime, IT worker schemesThe U.S. Treasury recently sanctioned eight individuals and two companies for laundering funds linked to North Korean cybercrime. Over $3…
-
Pro-Russian Hackers Use Linux VMs to Evade Detection
Source: Dark ReadingRead more: Pro-Russian Hackers Use Linux VMs to Evade DetectionCurly COMrades, a threat actor, utilizes Linux virtual machines (VMs) to operate undetected in Windows environments. Their activities are aligned…
-
Apple addresses over 100 vulnerabilities in security updates
Source: CyberScoopRead more: Apple addresses over 100 vulnerabilities in security updatesApple disclosed 105 vulnerabilities in MacOS 26.1 and 56 in iOS 26.1, affecting various devices. The update has drawn criticism…
-
Increase in Ransomware Extortion in Europe
Source: Dark ReadingRead more: Increase in Ransomware Extortion in EuropeEuropean organizations are experiencing a rise in cyber threats, particularly from ransomware extortion. Attackers are exploiting geopolitical tensions and utilizing…
-
Bringing together the minds defining the age of intelligence
Source: CIO MagazineRead more: Bringing together the minds defining the age of intelligenceThe DataDriven 2026 event will unite top leaders in data and AI to discuss the modernization of data foundations essential…







