Fortinet is the inaugural partner for FIRST’s new Community, Operational capacity, Resilience, and Empowerment initiative to empower cybersecurity and incident response teams worldwide through capacity building and community development. Learn more about CORE. This article has been indexed from…
Category: EN
Citrix NetScaler ADC and Gateway Vulnerability Actively Exploited in the Wild
Cloud Software Group has issued an urgent security advisory warning customers about a critical memory overflow vulnerability in NetScaler ADC and Gateway products, which could enable denial-of-service attacks. Exploits of this vulnerability have already been observed in the wild. The…
North Korean Hackers as Recruiters Attacking Developers With 35 New Malicious npm Packages
North Korean threat actors have launched a sophisticated supply chain attack campaign, embedding 35 malicious npm packages across 24 compromised accounts to target software developers through an elaborate recruitment deception. The campaign, identified as an extension of the ongoing “Contagious…
INTERPOL Warns of Sharp Rise in Cyber Attacks Targeting Western and Eastern Africa
The cybersecurity landscape across Africa has reached a critical juncture, with cybercrime now accounting for more than 30 percent of all reported crimes in Western and Eastern Africa, according to INTERPOL’s newly released 2025 Africa Cyberthreat Assessment Report. This alarming…
From Insight to Action: How Tenable One KPIs Drive Exposure Management Success
Tenable One empowers security teams to go beyond surface-level risk tracking and drive measurable improvements across their security programs. With unified visibility and customizable dashboards, Tenable One makes it easy to monitor the KPIs that matter most, helping teams shift…
CISA Warns of Renewed Exploits Targeting TP-Link Routers with Critical Flaws
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has raised fresh concerns about several outdated TP-Link router models that are being actively exploited by cybercriminals. Despite the flaw being identified years ago, it has re-emerged in recent attack campaigns,…
Scania Targeted in Extortion Attempt Following Data Breach
An alarm is triggered in both the automotive and financial industries when Scania Financial Services, based in Sweden, confirms that a cybersecurity incident has compromised sensitive company data, which has raised concerns in the industry. The breach was reportedly…
New Malicious Python Package Found Stealing Cloud Credentials
A dangerous piece of malware has been discovered hidden inside a Python software package, raising serious concerns about the security of open-source tools often used by developers. Security experts at JFrog recently found a harmful package uploaded to the…
Microsoft is named a Leader in The Forrester Wave™: Security Analytics Platforms, 2025
Microsoft is proud to be named a Leader in The Forrester Wave™: Security Analytics Platforms, Q2 2025—which we believe reflects our deep investment in innovation and commitment to support SOC’s critical mission. The post Microsoft is named a Leader in…
Have Fun Teaching – 27,126 breached accounts
In August 2021, the teaching resources website Have Fun Teaching suffered a data breach that leaked 80k WooCommerce transactions which were later posted to a popular hacking forum. The data contained 27k unique email addresses along with physical and IP…
Robinsons Malls – 195,597 breached accounts
In June 2024, the Philippines’ largest shopping-mall operators Robinsons Malls suffered a data breach stemming from their mobile app. The incident exposed 195k unique email addresses along with names, phone numbers, dates of birth, genders and the user’s city and…
Microsoft is named a Leader in The Forrester Wave™: Security Analytics Platforms, 2025
Microsoft is proud to be named a Leader in The Forrester Wave™: Security Analytics Platforms, Q2 2025—which we believe reflects our deep investment in innovation and commitment to support SOC’s critical mission. The post Microsoft is named a Leader in…
NSA and CISA Urge Adoption of Memory Safe Languages for Safety
NSA and CISA are urging developers to adopt memory safe languages (MSLs) to combat vulnerabilities in software This article has been indexed from www.infosecurity-magazine.com Read the original article: NSA and CISA Urge Adoption of Memory Safe Languages for Safety
Bumble Axes 30 Percent Of Global Workforce
More layoffs in tech sector as dating app Bumble axes hundreds of staff, providing a welcome rise in its share price This article has been indexed from Silicon UK Read the original article: Bumble Axes 30 Percent Of Global Workforce
AI Agents Are Creating Insider Security Threat Blind Spots, Research Finds
Only 30% of US businesses are actively mapping which AI agents have access to critical systems, creating a security blind spot. This article has been indexed from Security | TechRepublic Read the original article: AI Agents Are Creating Insider Security…
Microsoft is named a Leader in The Forrester Wave™: Security Analytics Platforms, 2025
Microsoft is proud to be named a Leader in The Forrester Wave™: Security Analytics Platforms, Q2 2025—which we believe reflects our deep investment in innovation and commitment to support SOC’s critical mission. The post Microsoft is named a Leader in…
Hacktivist Groups Target U.S. Companies and Military Domains in Retaliation for Iran Attacks
The United States has become a popular target for hacktivist groups in the escalating Israel-Iran conflict, following U.S. attacks on Iranian nuclear sites on June 21, 2025. Several pro-Iranian hacktivist collectives, including Mr Hamza, Team 313, Cyber Jihad, and Keymous+,…
NetNerve – AI Powered PCAP Analysis to Detect Anomalies & Potential Threats
A groundbreaking cybersecurity solution called NetNerve has emerged as a game-changer in network threat detection, leveraging artificial intelligence to analyze Packet Capture (PCAP) files with unprecedented accuracy and speed. This innovative platform represents a significant advancement in proactive cybersecurity measures,…
Windows 11 Update Configuration Hangs During Update Scanning
Microsoft has released a critical Windows configuration update in June 2025 to address a significant issue affecting Windows 11 users worldwide. The update targets a persistent problem where the Windows Update scanning mechanism becomes unresponsive, preventing users from checking for…
Kubernetes NodeRestriction Vulnerability Allows Nodes to Bypass Resource Allocation Checks
A newly disclosed vulnerability in Kubernetes has been identified that could allow compromised nodes to bypass critical authorization checks within the container orchestration platform. The security flaw, tracked as CVE-2025-4563, affects the NodeRestriction admission controller and poses potential risks for…