Cybersecurity
-
Cavalry Werewolf Malware Campaign Targets Russian Public Sector
Source: The Hacker NewsRead more: Cavalry Werewolf Malware Campaign Targets Russian Public SectorA threat actor linked to the YoroTrooper group is targeting the Russian public sector using malware like FoalShell and StallionRAT.…
-
Nearly Half of IT Leaders Report Significant Cloud Spending Waste According to VMware Report
Source: CIO MagazineRead more: Nearly Half of IT Leaders Report Significant Cloud Spending Waste According to VMware ReportA VMware survey reveals that almost half of IT decision-makers believe their organizations waste more than a quarter of their…
-
Oracle Says Known Vulnerabilities Possibly Exploited in Recent Extortion Attacks
Source: SecurityWeekRead more: Oracle Says Known Vulnerabilities Possibly Exploited in Recent Extortion AttacksOracle reported that vulnerabilities patched in July 2025 might have been exploited in recent extortion attacks. The investigation focuses on…
-
Hackers Steal and Leak Child Data from Nursery Chain Kido, Later Apologize and Delete Data
Source: Malware BytesRead more: Hackers Steal and Leak Child Data from Nursery Chain Kido, Later Apologize and Delete DataA hacking group called Radiant stole sensitive data related to about 8,000 children from nursery chain Kido and demanded ransom.…
-
HSBC and IBM Test Quantum Computing in Simulated Commercial Environment for Algorithmic Trading
Source: CIO MagazineRead more: HSBC and IBM Test Quantum Computing in Simulated Commercial Environment for Algorithmic TradingHSBC and IBM have collaborated on a project using quantum computing to improve algorithmic trading in bond markets. The study…
-
CISA Adds High-Severity Command Injection Vulnerability CVE-2025-4008 in Smartbedded Meteobridge to KEV Catalog
Source: The Hacker NewsRead more: CISA Adds High-Severity Command Injection Vulnerability CVE-2025-4008 in Smartbedded Meteobridge to KEV CatalogCISA has flagged CVE-2025-4008, a command injection vulnerability in the Smartbedded Meteobridge web interface, as actively exploited and added it…
-
Red Hat GitLab Instance Breached Exposing Consulting Data
Source: CyberScoopRead more: Red Hat GitLab Instance Breached Exposing Consulting DataRed Hat confirmed a cyberattack compromised a GitLab instance used by its consulting team, exposing some customer-related data. The breach…
-
Clop Ransomware Group Targets Oracle Customers with Extortion Emails
Source: CyberScoopRead more: Clop Ransomware Group Targets Oracle Customers with Extortion EmailsClop ransomware group has sent emails to Oracle customers demanding payment while framing the attack as a business transaction. The…
-
Microsoft Outlook Stops Displaying Inline SVG Images Used in Attacks
Source: BleepingComputerRead more: Microsoft Outlook Stops Displaying Inline SVG Images Used in AttacksMicrosoft has announced that Outlook for Web and the new Outlook for Windows will no longer display inline SVG images,…
-
DrayTek Warns of Remote Code Execution Bug in Vigor Routers
Source: BleepingComputerRead more: DrayTek Warns of Remote Code Execution Bug in Vigor RoutersDrayTek has issued a warning regarding a security vulnerability affecting multiple Vigor router models. This flaw allows remote, unauthenticated individuals…






