Cybersecurity
-
SAP Customers Unconvinced About S/4HANA ROI
Source: CIO MagazineRead more: SAP Customers Unconvinced About S/4HANA ROIA significant percentage of SAP customers doubt the company’s shift from perpetual licenses to subscription pricing, raising concerns about future…
-
Multiple Vulnerabilities in AI Infrastructure Products
Source: Dark ReadingRead more: Multiple Vulnerabilities in AI Infrastructure ProductsSecurity researchers have identified several vulnerabilities in AI infrastructure, including one that allows for remote code execution. These flaws pose…
-
Weaponized npm Packages Targeting Windows Systems
Source: Cyber Security NewsRead more: Weaponized npm Packages Targeting Windows SystemsA supply-chain attack is exploiting npm packages to deliver Vidar infostealer malware. The campaign published 17 malicious packages, leading to…
-
New Phishing Attack Targeting Travelers from Hotel’s Compromised Booking.com Account
Source: Cyber Security NewsRead more: New Phishing Attack Targeting Travelers from Hotel’s Compromised Booking.com AccountA sophisticated phishing campaign is targeting hotel guests via compromised Booking.com accounts. Dubbed ‘I Paid Twice’, it exploits credential theft…
-
Hidden Logic Bombs in Malware-Laced NuGet Packages
Source: The Hacker NewsRead more: Hidden Logic Bombs in Malware-Laced NuGet PackagesMalicious NuGet packages have been discovered that can execute time-delayed payloads, threatening database operations and industrial control systems. These packages…
-
Chinese Hackers Organization Influence U.S. Government
Source: Cyber Security NewsRead more: Chinese Hackers Organization Influence U.S. GovernmentChina-linked threat actors are intensifying efforts to influence American governmental decision-making by targeting non-profit organizations. Their recent intrusion in April…
-
Researchers Evaded Elastic EDR’s Call Stack Signatures by Exploiting Call Gadgets
Source: Cyber Security NewsRead more: Researchers Evaded Elastic EDR’s Call Stack Signatures by Exploiting Call GadgetsSecurity researchers successfully bypassed Elastic EDR’s detection using call gadgets. This technique involved manipulating the call stack to evade detection…
-
LANDFALL: New Commercial-Grade Android Spyware
Source: Palo Alto Networks Unit 42Read more: LANDFALL: New Commercial-Grade Android SpywareLANDFALL spyware exploits a critical vulnerability in Samsung Android’s image processing library, specifically CVE-2025-21042. This spyware was inserted into malicious…
-
SAP to offer concessions to the EU over antitrust probe into ERP support practices
Source: CIO MagazineRead more: SAP to offer concessions to the EU over antitrust probe into ERP support practicesSAP plans to submit concessions to the European Commission regarding an antitrust investigation into its ERP support practices. These concessions…
-
Enterprise Credentials at Risk
Source: The Hacker NewsRead more: Enterprise Credentials at RiskA routine email can lead to significant cybersecurity risks. Employees may unknowingly provide their login details to attackers through phishing…







