Category: EN

Financial cyberthreats in 2024

The Kaspersky financial threat report for 2024 contains the main trends and statistics on financial phishing and scams, mobile and PC banking malware, as well as recommendations on how to protect yourself and your business. This article has been indexed…

NetFoundry OT security platform protects critical infrastructure

NetFoundry unveiled a new version of its OT security platform enabling customers to secure critical infrastructure, including for on-premises and air-gapped environments such as substations. The announcement meets three customer demands: Software-only, interoperable, vendor-neutral, OT microsegmentation Secure connectivity to IT…

Linux Kernel 6.14 Released: Everything You Need to Know

Linus Torvalds released the Linux 6.14 kernel today after an unexpected quiet day yesterday, marking a new milestone in the Linux ecosystem. This version is set to power several upcoming Linux distribution releases, including Ubuntu 25.04 and Fedora 42. Linux…

Next.js Middleware Permission Bypass Vulnerability (CVE-2025-29927)

Overview Recently, NSFOCUS CERT detected that Next.js issued a security announcement and fixed the middleware permission bypass vulnerability (CVE-2025-29927). Because Next.js lacks effective verification of the source of the x-middleware-subrequest header, when configuring to use middleware for authentication and authorization,…

Cyber Attack news headlines trending on Google

Interpol Carries Out Major Arrests in Global Cybercrime Crackdown In a significant operation called “Operation Red Card,” Interpol has apprehended more than 300 individuals linked to cyber-attacks targeting both public and private organizations across Africa. Those arrested are believed to…

FBI Warns Against Using Unsafe File Converter Tools

The FBI Denver Field Office has sounded the alarm about a burgeoning scam involving purportedly free online document converter tools. This scam, which has gained traction globally, sees cybercriminals harnessing these tools to spread malware, leading to severe consequences such…

How AI agents could undermine computing infrastructure security

In this Help Net Security video, Ev Kontsevoy, CEO at Teleport, explores the risks AI agents pose to computing infrastructure, particularly when exposed to social engineering attacks. Unlike traditional software, AI agents aren’t fully deterministic, making them more vulnerable to…

Ingress NGINX RCE Vulnerability Allows Attackers to Compromise Entire Cluster

A series of remote code execution (RCE) vulnerabilities known as “IngressNightmare” have been discovered in the Ingress NGINX Controller for Kubernetes. These vulnerabilities, identified as CVE-2025-1097, CVE-2025-1098, CVE-2025-24514, and CVE-2025-1974, pose a critical threat to Kubernetes clusters, allowing attackers to gain unauthorized access to…

Cybersecurity jobs available right now: March 25, 2025

Analyst – Cyber Threat Intelligence Adecco | UAE | On-site – View job details As an Analyst – Cyber Threat Intelligence, you will conduct threat hunting missions across multi-cloud environments and perform cyber forensics to analyze security incidents. You will…

AI as an ally: The future of scam protection

A look at how the industry can turn AI into a powerful scam-fighting tool  Artificial intelligence (AI) has advanced exponentially in recent years, but the truth is that AI technology is a double-edged sword. While AI helps with countless innocent…

Kyocera CISO: Five reasons to consolidate your tech vendors

Andrew Smith, Kyocera’s CISO, explains why organisations should consider consolidating their tech vendors and how to avoid vendor lock-in Managing a full suite of tech vendors can be time-consuming and complicated. AI, cybersecurity, document management – the list can feel…