Category: EN

Tor Browser 14.5.2 Released: Bug Fixes and Enhanced Features

Tor Project has launched Tor Browser 14.5.2, a significant update addressing security vulnerabilities, refining cross-platform functionality, and enhancing build system reliability. This release integrates critical Firefox security patches, resolves longstanding privacy-related bugs, and implements infrastructural improvements to streamline future development.…

CampusGuard ScriptSafe prevents unauthorized script execution

CampusGuard introduced ScriptSafe, a software data security and privacy compliance solution.  ScriptSafe identifies and mitigates risks posed by JavaScript, third-party vendors and open-source code within your web ecosystem. Beyond securing your code, it addresses a critical gap in managing third-party digital…

Huawei Debuts HarmonyOS Laptop With 18-Inch Folding Display

Huawei launches MateBook Pro laptop with 18-inch folding display powered by company’s own HarmonyOS operating system and processing chips This article has been indexed from Silicon UK Read the original article: Huawei Debuts HarmonyOS Laptop With 18-Inch Folding Display

Critical pfSense Firewall Flaws Enable Attackers to Inject Malicious Code

Security researchers have uncovered three critical vulnerabilities in pfSense firewall software that could allow attackers to inject malicious code, corrupt configurations, and potentially gain unauthorized access to systems. These vulnerabilities were responsibly disclosed to Netgate, the company behind pfSense, between…

CISA Adds Actively Exploited Ivanti EPMM Zero-Day to KEV Catalog

Cybersecurity and Infrastructure Security Agency (CISA) has added two critical zero-day vulnerabilities affecting Ivanti Endpoint Manager Mobile (EPMM) to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild. The flaws CVE-2025-4427 and CVE-2025-4428 enable authentication…

Malware Evasion Techniques – What Defenders Need to Know

In 2025, cybercriminals are raising the stakes by deploying sophisticated malware that bypasses traditional security measures, using advanced malware evasion techniques. Recent data shows that over 2,500 ransomware attacks were reported in just the first half of 2024, averaging more…

Honeypots become a strategic layer in cyber defence

J2 Software has introduced ‘Honeypot as a Service’, a plug-and-play solution designed to deceive attackers, gather critical threat intelligence, and ultimately strengthen an organisation’s cyber resilience. This new approach is particularly crucial as cyberattacks become more complex and targeted. A…

How a Turing Test Can Curb AI-Based Cyber Attacks

In recent years, artificial intelligence (AI) has emerged as a powerful tool, revolutionizing industries from healthcare to finance. However, as AI’s capabilities continue to grow, so does its potential for misuse—especially in the realm of cybersecurity. One of the most…