Cybersecurity
-
Southeast Asian Scam Centers Face More Financial Sanctions
Source: Dark ReadingRead more: Southeast Asian Scam Centers Face More Financial SanctionsThe US government has implemented sanctions against firms linked to cybercrime syndicates operating in Burma and Cambodia. This move aims…
-
Data Is the New Diamond: Latest Moves by Hackers and Defenders
Source: Palo Alto Networks Unit 42Read more: Data Is the New Diamond: Latest Moves by Hackers and DefendersUnit 42 discusses how cybercriminals are increasingly exploiting stolen data as a valuable asset. This trend underscores the growing sophistication…
-
Critical infrastructure security tech needs to be as good as our smartphones, top NSC cyber official says
Source: CyberScoopRead more: Critical infrastructure security tech needs to be as good as our smartphones, top NSC cyber official saysAlexei Bulazel emphasizes the importance of enhancing cyber defense for critical infrastructure. He insists that security technology must match the…
-
Microsoft Patch Tuesday addresses 81 vulnerabilities, none actively exploited
Source: CyberScoopRead more: Microsoft Patch Tuesday addresses 81 vulnerabilities, none actively exploitedThis month’s Microsoft Patch Tuesday has addressed 81 vulnerabilities, none of which were found to be actively exploited. The company…
-
U.S. sanctions cyber scammers who stole billions from Americans
Source: BleepingComputerRead more: U.S. sanctions cyber scammers who stole billions from AmericansThe U.S. Department of the Treasury has sanctioned multiple cyber scam networks in Southeast Asia responsible for stealing over $10…
-
U.S. indicts Ukrainian national for hundreds of ransomware attacks using multiple variants
Source: CyberScoopRead more: U.S. indicts Ukrainian national for hundreds of ransomware attacks using multiple variantsThe Department of Justice has unsealed an indictment against Volodymyr Viktorovych Tymoshchuk, a Ukrainian national accused of orchestrating a ransomware…
-
Hackers hide behind Tor in exposed Docker API breaches
Source: BleepingComputerRead more: Hackers hide behind Tor in exposed Docker API breachesA malicious actor has enhanced their tools targeting exposed Docker APIs, making them more dangerous and setting the stage for…
-
EoP Flaws Again Lead Microsoft Patch Day
Source: Dark ReadingRead more: EoP Flaws Again Lead Microsoft Patch DayIn its September security update, Microsoft disclosed almost half of the CVEs related to privilege escalation, including a known vulnerability.…
-
Microsoft Patches 86 Vulnerabilities
Source: SecurityWeekRead more: Microsoft Patches 86 VulnerabilitiesMicrosoft has released patches for 86 vulnerabilities across Windows and other products, some of which have been rated with an…
-
Adobe Patches Critical ColdFusion and Commerce Vulnerabilities
Source: SecurityWeekRead more: Adobe Patches Critical ColdFusion and Commerce VulnerabilitiesAdobe has released its September 2025 Patch Tuesday updates, addressing nearly two dozen vulnerabilities in nine products. This action is…







