Cybersecurity
-
Microsoft Enables Default Auto-Archiving in Exchange Online to Manage Mailbox Overflow
Source: BleepingComputerRead more: Microsoft Enables Default Auto-Archiving in Exchange Online to Manage Mailbox OverflowMicrosoft has started enabling threshold-based auto-archiving by default in Exchange Online to address issues from mailboxes reaching capacity unexpectedly. This…
-
MIT and Toyota Develop AI-Driven Steerable Scene Generation for Realistic Robotic Training Environments
Source: MIT AI NewsRead more: MIT and Toyota Develop AI-Driven Steerable Scene Generation for Realistic Robotic Training EnvironmentsResearchers at MIT CSAIL and Toyota Research Institute have created a novel AI approach called steerable scene generation to produce…
-
Crimson Collective Hackers Target AWS Cloud Instances for Data Theft and Extortion
Source: BleepingComputerRead more: Crimson Collective Hackers Target AWS Cloud Instances for Data Theft and ExtortionThe Crimson Collective threat group has been actively targeting AWS cloud environments to steal data and extort organizations. Their attacks…
-
Hackers Exploit WordPress Themes to Inject Malicious JavaScript Redirects
Source: The Hacker NewsRead more: Hackers Exploit WordPress Themes to Inject Malicious JavaScript RedirectsCybersecurity researchers have identified a campaign exploiting WordPress themes to inject malicious JavaScript that redirects users to deceptive sites. The…
-
Critical Authentication Bypass Vulnerability Exploited in Service Finder WordPress Theme
Source: BleepingComputerRead more: Critical Authentication Bypass Vulnerability Exploited in Service Finder WordPress ThemeHackers are actively exploiting a serious vulnerability in the Service Finder WordPress theme which allows bypassing authentication to gain admin…
-
Critical RCE Vulnerability Identified in Figma’s Agentic AI Integration
Source: Dark ReadingRead more: Critical RCE Vulnerability Identified in Figma’s Agentic AI IntegrationA security vulnerability (CVE-2025-53967) in Figma’s interaction with agentic AI tools allows remote code execution. Users are advised to apply…
-
London Police Arrest Suspects in Nursery Ransomware Attack and Child Doxing Case
Source: BleepingComputerRead more: London Police Arrest Suspects in Nursery Ransomware Attack and Child Doxing CaseThe UK Metropolitan Police arrested two suspects linked to the doxing of children following a ransomware attack on a chain…
-
German Government Opposes EU Proposal for Mass Scanning of Encrypted Communications
Source: CyberScoopRead more: German Government Opposes EU Proposal for Mass Scanning of Encrypted CommunicationsThe German government announced its opposition to an EU proposal that would mandate mass scanning of phones and devices before…
-
Security Strategies for Google Workspace Integrations Amid Salesloft Drift Breach
Source: BleepingComputerRead more: Security Strategies for Google Workspace Integrations Amid Salesloft Drift BreachThe Salesloft Drift breach highlights vulnerabilities in trusted integrations without directly hacking Google. Material Security recommends securing OAuth, monitoring risky…
-
Chinese Hackers Exploit Open-Source Tool Nezha to Deliver Gh0st RAT Malware
Source: The Hacker NewsRead more: Chinese Hackers Exploit Open-Source Tool Nezha to Deliver Gh0st RAT MalwareThreat actors believed to be linked to China have weaponized the open-source monitoring tool Nezha to deliver the Gh0st RAT…









