WhatsApp Launches Private Processing to Enable AI Features While Protecting Message Privacy

29/04/2025 0 Comments 0 tags

Popular messaging app WhatsApp on Tuesday unveiled a new technology called Private Processing to enable artificial intelligence (AI) capabilities in a privacy-preserving manner. “Private Processing will allow users to leverage

SentinelOne Uncovers Chinese Espionage Campaign Targeting Its Infrastructure and Clients

29/04/2025 0 Comments 0 tags

Cybersecurity company SentinelOne has revealed that a China-nexus threat cluster dubbed PurpleHaze conducted reconnaissance attempts against its infrastructure and some of its high-value customers. “We first became aware of this

Google Reports 75 Zero-Days Exploited in 2024 — 44% Targeted Enterprise Security Products

29/04/2025 0 Comments 0 tags

Google has revealed that it observed 75 zero-day vulnerabilities exploited in the wild in 2024, down from 98 in 2023.  Of the 75 zero-days, 44% of them targeted enterprise products.

Product Walkthrough: Securing Microsoft Copilot with Reco

29/04/2025 0 Comments 0 tags

Find out how Reco keeps Microsoft 365 Copilot safe by spotting risky prompts, protecting data, managing user access, and identifying threats – all while keeping productivity high. Microsoft 365 Copilot

Malware Attack Targets World Uyghur Congress Leaders via Trojanized UyghurEdit++ Tool

29/04/2025 0 Comments 0 tags

In a new campaign detected in March 2025, senior members of the World Uyghur Congress (WUC) living in exile have been targeted by a Windows-based malware that’s capable of conducting

CISA Adds Actively Exploited Broadcom and Commvault Flaws to KEV Database

29/04/2025 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added two high-severity security flaws impacting Broadcom Brocade Fabric OS and Commvault Web Server to its Known Exploited Vulnerabilities (KEV)

⚡ Weekly Recap: Critical SAP Exploit, AI-Powered Phishing, Major Breaches, New CVEs & More

28/04/2025 0 Comments 0 tags

What happens when cybercriminals no longer need deep skills to breach your defenses? Today’s attackers are armed with powerful tools that do the heavy lifting — from AI-powered phishing kits

How Breaches Start: Breaking Down 5 Real Vulns

28/04/2025 0 Comments 0 tags

Not every security vulnerability is high risk on its own – but in the hands of an advanced attacker, even small weaknesses can escalate into major breaches. These five real

Earth Kurma Targets Southeast Asia With Rootkits and Cloud-Based Data Theft Tools

28/04/2025 0 Comments 0 tags

Government and telecommunications sectors in Southeast Asia have become the target of a “sophisticated” campaign undertaken by a new advanced persistent threat (APT) group called Earth Kurma since June 2024.

WooCommerce Users Targeted by Fake Patch Phishing Campaign Deploying Site Backdoors

28/04/2025 0 Comments 0 tags

Cybersecurity researchers are warning about a large-scale phishing campaign targeting WooCommerce users with a fake security alert urging them to download a “critical patch” but deploy a backdoor instead. WordPress