Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks

16/05/2025 0 Comments 0 tags

Researchers at ETH Zürich have discovered yet another security flaw that they say impacts all modern Intel CPUs and causes them to leak sensitive data from memory, showing that the

[Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications

16/05/2025 0 Comments 0 tags

Modern apps move fast—faster than most security teams can keep up. As businesses rush to build in the cloud, security often lags behind. Teams scan code in isolation, react late

Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit

15/05/2025 0 Comments 0 tags

Austrian privacy non-profit noyb (none of your business) has sent Meta’s Irish headquarters a cease-and-desist letter, threatening the company with a class action lawsuit if it proceeds with its plans

Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails

15/05/2025 0 Comments 0 tags

Cryptocurrency exchange Coinbase has disclosed that unknown cyber actors broke into its systems and stole account data for a small subset of its customers. “Criminals targeted our customer support agents

Pen Testing for Compliance Only? It’s Time to Change Your Approach

15/05/2025 0 Comments 0 tags

Imagine this: Your organization completed its annual penetration test in January, earning high marks for security compliance. In February, your development team deployed a routine software update. By April, attackers

Malicious npm Package Leverages Unicode Steganography, Google Calendar as C2 Dropper

15/05/2025 0 Comments 0 tags

Cybersecurity researchers have discovered a malicious package named “os-info-checker-es6” that disguises itself as an operating system information utility to stealthily drop a next-stage payload onto compromised systems. “This campaign employs

Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers

15/05/2025 0 Comments 0 tags

A Russia-linked threat actor has been attributed to a cyber espionage operation targeting webmail servers such as Roundcube, Horde, MDaemon, and Zimbra via cross-site scripting (XSS) vulnerabilities, including a then-zero-day

5 BCDR Essentials for Effective Ransomware Defense

15/05/2025 0 Comments 0 tags

Ransomware has evolved into a deceptive, highly coordinated and dangerously sophisticated threat capable of crippling organizations of any size. Cybercriminals now exploit even legitimate IT tools to infiltrate networks and

New Chrome Vulnerability Enables Cross-Origin Data Leak via Loader Referrer Policy

15/05/2025 0 Comments 0 tags

Google on Wednesday released updates to address four security issues in its Chrome web browser, including one for which it said there exists an exploit in the wild. The high-severity

Xinbi Telegram Market Tied to $8.4B in Crypto Crime, Romance Scams, North Korea Laundering

14/05/2025 0 Comments 0 tags

A Chinese-language, Telegram-based marketplace called Xinbi Guarantee has facilitated no less than $8.4 billion in transactions since 2022, making it the second major black market to be exposed after HuiOne