Category: EN

VMware vCenter and NSX Flaws Allow Hackers to Enumerate Usernames

Broadcom released VMSA-2025-0016 to address three key vulnerabilities affecting VMware vCenter Server and NSX products. The vulnerabilities include an SMTP header injection in vCenter (CVE-2025-41250) and two distinct username enumeration flaws in NSX (CVE-2025-41251 and CVE-2025-41252). All three are rated…

Risk of Prompt Injection in LLM-Integrated Apps

Large Language Models (LLMs) are at the core of today’s AI revolution, powering advanced tools and other intelligent chatbots. These sophisticated neural networks are trained on vast amounts of text data, enabling them to understand context, language nuances, and complex…

The hidden risks inside open-source code

Open-source software is everywhere. It runs the browsers we use, the apps we rely on, and the infrastructure that keeps businesses connected. For many security leaders, it is simply part of the environment, not something they think about every day.…

Hackers Distribute Malicious Microsoft Teams Build to Steal Remote Access

Cybersecurity researchers have identified a sophisticated campaign where threat actors are using malicious advertisements and search engine optimization poisoning to distribute fake Microsoft Teams installers containing the Oyster backdoor malware. The campaign targets users searching for legitimate Microsoft Teams downloads…

New Harrods Data Breach Leaks Personal Information of 430,000 Customers

Luxury department store Harrods has become the latest victim of a significant cybersecurity incident after hackers successfully accessed personal data belonging to 430,000 customers. The prestigious London retailer confirmed that threat actors contacted the company following the breach, though Harrods has stated it…

New Splunk 10 Feature – Effective Configuration

One of the Splunk 10 features I’m most excited about is the “Effective Configuration” dashboard.  In this blog post, I’ll explore why this might be my favorite new Splunk 10 feature so far! The Need You likely have a number…

Your budget Android phone might be spying on you

Researchers have found that many low-cost Android devices come with pre-installed apps that have high-level access to the system. Unlike apps from the Google Play Store, many of these are not subject to thorough checks and can serve as vectors…

Sleep Soundly Knowing Your NHIs are Managed Well

Are Your Non-Human Identities Fully Protected? Managing Non-Human Identities (NHIs) has become critical, with organizations relying heavily on machine identities to perform essential tasks. But are these identities adequately managed and protected to ensure the security of your systems? Understanding…