Tag: EN

Securing Data in the AI Era

The 2025 Data Risk Report: Enterprises face potentially serious data loss risks from AI-fueled tools. Adopting a unified, AI-driven approach to data security can help. As businesses increasingly rely on cloud-driven platforms and AI-powered tools to accelerate digital transformation, the…

Wing FTP Server RCE Vulnerability Under Active Exploitation

Security researchers at Huntress have confirmed active exploitation of a critical remote code execution vulnerability in Wing FTP Server, designated CVE-2025-47812, with the first observed attack occurring just one day after the vulnerability’s public disclosure. The flaw affects versions before…

British Man Sentenced for Network Rail Wi-Fi Hack

The man was handed a suspended prison sentence for offenses relating to the hack of Network Rail public Wi-Fi, exposing customers to offensive messaging This article has been indexed from www.infosecurity-magazine.com Read the original article: British Man Sentenced for Network…

IT Giant Ingram Micro Restores Operations After Ransomware Attack

Ingram Micro Holding Corporation (NYSE: INGM), a global leader in IT distribution and technology solutions, has announced that it has successfully restored operations across all countries and regions following a ransomware attack identified on certain internal systems. The incident, first…

Apache HTTP Server 2.4.64 Released With Patch for 8 Vulnerabilities

The Apache Software Foundation has released Apache HTTP Server version 2.4.64, addressing eight critical security vulnerabilities that affected versions spanning from 2.4.0 through 2.4.63.  This latest update resolves a range of issues, including HTTP response splitting, server-side request forgery (SSRF),…

AMD Warns of Transient Scheduler Attacks Affecting Wide Range of Chipsets

Advanced Micro Devices has disclosed a series of critical security vulnerabilities affecting multiple generations of its processor architectures, stemming from transient scheduler attacks that exploit speculative execution mechanisms. The vulnerabilities, identified through four distinct Common Vulnerabilities and Exposures (CVE) entries,…