Cybersecurity
-
IoT Security Flounders Amid Churning Risk
Source: Dark ReadingRead more: IoT Security Flounders Amid Churning RiskThe interconnected nature of the Internet of Things (IoT) faces significant security challenges as a key US government initiative remains…
-
Sneaky, Malicious MCP Server Exfiltrates Secrets via BCC
Source: Dark ReadingRead more: Sneaky, Malicious MCP Server Exfiltrates Secrets via BCCA newly identified malicious MCP server is leveraging AI to send critical emails to cybercriminals. This includes communications related to…
-
Akira Hits SonicWall VPNs in Broad Ransomware Campaign
Source: Dark ReadingRead more: Akira Hits SonicWall VPNs in Broad Ransomware CampaignThe Akira ransomware group is actively targeting SonicWall firewall customers by exploiting a vulnerability identified last year. Businesses using these…
-
Apple Patches Single Vulnerability CVE-2025-43400, (Mon, Sep 29th)
Source: SANS Internet Storm CenterRead more: Apple Patches Single Vulnerability CVE-2025-43400, (Mon, Sep 29th)Apple has rolled out a .0.1 update addressing a significant security vulnerability found in its iOS and macOS systems. The…
-
Interpol operation disrupts romance scam and sextortion networks in Africa
Source: CyberScoopRead more: Interpol operation disrupts romance scam and sextortion networks in AfricaInterpol has arrested 260 cybercrime suspects across 14 African countries as part of “Operation Contender 3.0.” This operation focused on…
-
Ransomware gang sought BBC reporter’s help in hacking media giant
Source: BleepingComputerRead more: Ransomware gang sought BBC reporter’s help in hacking media giantA representative from the Medusa ransomware group sought to recruit a BBC correspondent, offering financial incentives to become an insider…
-
Increase in Scans for Palo Alto Global Protect Vulnerability (CVE-2024-3400), (Mon, Sep 29th)
Source: SANS Internet Storm CenterRead more: Increase in Scans for Palo Alto Global Protect Vulnerability (CVE-2024-3400), (Mon, Sep 29th)Recent attacks have targeted vulnerabilities in security appliances, specifically exploiting CVE-2024-3400. This vulnerability arises from the failure to validate session…
-
EvilAI Malware Masquerades as AI Tools to Infiltrate Global Organizations
Source: The Hacker NewsRead more: EvilAI Malware Masquerades as AI Tools to Infiltrate Global OrganizationsThreat actors are utilizing AI tools to deliver malware, impacting organizations globally. The campaign has been identified by Trend Micro…
-
UK govt backs JLR with £1.5 billion loan guarantee after cyberattack
Source: BleepingComputerRead more: UK govt backs JLR with £1.5 billion loan guarantee after cyberattackThe UK Government has unveiled a £1.5 billion loan guarantee for Jaguar Land Rover (JLR) to help recover from a…
-
Harrods suffers new data breach exposing 430,000 customer records
Source: BleepingComputerRead more: Harrods suffers new data breach exposing 430,000 customer recordsHarrods reported a cybersecurity incident involving a data breach that affected 430,000 customer records. The breach was attributed to a…






