SAP zero-day vulnerability under widespread active exploitation Hackers abuse OAuth 2.0 workflows to hijack Microsoft 365 accounts Cybersecurity firm CEO charged with installing malware on hospital systems Thanks to today’s episode sponsor, ThreatLocker ThreatLocker® is a global leader in Zero…
Category: EN
The 2026 FIFA World Cup is coming to North America, and so are the ticket scams
North America will host the biggest sporting event in the world: the 2026 FIFA World Cup. It will take place in less than fifteen months..… The post The 2026 FIFA World Cup is coming to North America, and so are…
New iOS Vulnerability Could Brick iPhones with Just One Line of Code
A security researcher has uncovered a critical vulnerability in iOS, Apple’s flagship mobile operating system. The flaw, CVE-2025-24091, which leverages the long-standing but little-known “Darwin notification” system, allows any app-including those confined by Apple’s usually strict sandbox restrictions push the…
New iOS Critical Vulnerability That Could Brick iPhones With a Single Line of Code
A critical vulnerability in iOS could allow malicious applications to disable iPhones with just a single line of code permanently. The vulnerability, assigned CVE-2025-24091, leverages the operating system’s Darwin notifications system to trigger an endless reboot cycle, effectively “bricking” devices…
Microsoft pitches pay-to-patch reboot reduction subscription for Windows Server 2025
Redmond reckons $1.50/core/month hotpatch service is worth it to avoid eight Patch Tuesday scrambles each year Microsoft has announced that its preview of hotpatching for on-prem Windows Server 2025 will become a paid subscription service in July.… This article has…
Cyber Security Company CEO Arrested for Installing Malware Onto Hospital Computers
Jeffrey Bowie, CEO of cybersecurity firm Veritaco, was arrested on April 14, 2025, facing two counts of violating Oklahoma’s Computer Crimes Act for allegedly installing malware on computers at St. Anthony Hospital in Oklahoma City. The incident, which occurred on…
‘Slopsquatting’ and Other New GenAI Cybersecurity Threats
As generative artificial intelligence develops, new terms and emerging threats are grabbing headlines regarding cyber threats to enterprises. The post ‘Slopsquatting’ and Other New GenAI Cybersecurity Threats appeared first on Security Boulevard. This article has been indexed from Security Boulevard…
Google Cloud Enhances Databases with Firestore and MongoDB Features
Discover Google’s Firestore with MongoDB compatibility, enhancing cloud database functionality with serverless architecture. Explore the future of data storage. The post Google Cloud Enhances Databases with Firestore and MongoDB Features appeared first on Security Boulevard. This article has been indexed…
Blue Shield of California Data Breach Exposes 4.7M Members’ Info
Discover the Blue Shield of California data breach affecting 4.7M members. Learn about the risks and essential security measures to protect your data. The post Blue Shield of California Data Breach Exposes 4.7M Members’ Info appeared first on Security Boulevard.…
Chinese cars can secretly transfer data from charging stations in UK
Chinese products have become a staple in markets around the world. From household items like pens to complex machinery such as cars, China’s manufacturing power is unmatched. The primary reasons for their widespread presence are their affordability, accessibility, and ease…
Essential Cloud Security Practices Every User Must Follow
As businesses and individuals increasingly rely on cloud services for storage, collaboration, and computing power, the importance of securing cloud environments has never been more critical. Cloud computing offers numerous advantages, including scalability, accessibility, and cost-efficiency. However, with these benefits…
Three IXON VPN Client Vulnerabilities Let Attackers Escalate Privileges
Security researchers at Shelltrail have discovered three significant vulnerabilities in the IXON VPN client that could allow attackers to escalate privileges on both Windows and Linux systems. The vulnerabilities, temporarily designated as CVE-2025-ZZZ-01, CVE-2025-ZZZ-02, and CVE-2025-ZZZ-03, affect the widely used…
Cybercriminals Selling Sophisticated HiddenMiner Malware on Dark Web Forums
Cybercriminals have begun openly marketing a powerful new variant of the HiddenMiner malware on underground dark web forums, raising alarms within the cybersecurity community. The malware, a heavily modified Monero (XMR) cryptocurrency miner, attracts buyers due to its advanced stealth…
Threat actors are scanning your environment, even if you’re not
In a world where organizations’ digital footprint is constantly changing and attackers regularly capitalize on security failings in exposed IT assets, making the effort to minimize your external attack surface is a no-brainer. The goal is simple: Make your organization…
Cybersecurity Updates: CEO Legal Troubles, Global Cyber Rules, Microsoft Fix Issues, and AI at B-Side SF
In this episode of ‘Cybersecurity Today’, host David Shipley covers multiple key stories: Veritaco CEO Jeffrey Bowie is charged with attempting to infect a hospital with malware. Global Chief Information Security Officers (CISOs) call on world governments to harmonize cybersecurity…
Cybersecurity Firm CEO Arrested for Planting Malware in Hospital Systems
Jeffrey Bowie, the CEO of a local cybersecurity firm, has been arrested for allegedly planting malware on computers at SSM St. Anthony Hospital. Bowie, who until recently touted himself as a leader in protecting businesses from cyber threats, now faces…
GoSearch: Open-source OSINT tool for uncovering digital footprints
GoSearch is an open-source OSINT tool built to uncover digital footprints linked to specific usernames. Designed for speed and accuracy, it lets users quickly track someone’s online presence across multiple platforms. GoSearch incorporates data from Hudson Rock’s Cybercrime Database, offering…
Ransomware attacks are getting smarter, harder to stop
Ransomware attacks are becoming more refined and pervasive, posing significant challenges to organizations globally. A Veeam report reveals that while the percentage of companies impacted by ransomware attacks has slightly declined from 75% to 69%, the threat remains substantial. This…
Most critical vulnerabilities aren’t worth your attention
Web applications face a wide range of risks, including known-exploitable vulnerabilities, supply chain attacks, and insecure identity configurations in CI/CD, according to the Datadog State of DevSecOps 2025 report. 14% of Java services still contain at least one vulnerability By…
400+ SAP NetWeaver Devices Vulnerable to 0-Day Attacks that Exploited in the Wild
Shadow Servers have identified 454 SAP NetWeaver systems vulnerable to a critical zero-day vulnerability that has been actively exploited in the wild. The vulnerability, tracked as CVE-2025-31324, allows unauthenticated attackers to upload malicious files to affected systems, potentially leading to…