Security

New Ballista Botnet spreads using TP-Link flaw. Is it an Italian job?New Ballista Botnet spreads using TP-Link flaw. Is it an Italian job?

New Ballista Botnet spreads using TP-Link flaw. Is it an Italian job?

The Ballista botnet is exploiting an unpatched TP-Link vulnerability, targeting over 6,000 Archer routers, Cato CTRL researchers warn. Cato CTRL…

3 weeks ago
Apple fixed the third actively exploited zero-day of 2025Apple fixed the third actively exploited zero-day of 2025

Apple fixed the third actively exploited zero-day of 2025

Apple addressed a zero-day vulnerability, tracked as CVE-2025-24201, that has been exploited in "extremely sophisticated" cyber attacks. Apple has released…

3 weeks ago
U.S. CISA adds Advantive VeraCore and Ivanti EPM flaws to its Known Exploited Vulnerabilities catalog<gwmw style="display:none;"></gwmw>U.S. CISA adds Advantive VeraCore and Ivanti EPM flaws to its Known Exploited Vulnerabilities catalog<gwmw style="display:none;"></gwmw>

U.S. CISA adds Advantive VeraCore and Ivanti EPM flaws to its Known Exploited Vulnerabilities catalog<gwmw style="display:none;"></gwmw>

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Advantive VeraCore and Ivanti EPM flaws to its Known Exploited Vulnerabilities catalog. The U.S.…

3 weeks ago
Cybersecurity Challenges in Cross-Border Data Transfers and Regulatory Compliance StrategiesCybersecurity Challenges in Cross-Border Data Transfers and Regulatory Compliance Strategies

Cybersecurity Challenges in Cross-Border Data Transfers and Regulatory Compliance Strategies

Cross-border data transfers enable global business but face challenges from varying cybersecurity laws, increasing risks of cyberattacks and data breaches.…

3 weeks ago
Elon Musk blames a massive cyberattack for the X outagesElon Musk blames a massive cyberattack for the X outages

Elon Musk blames a massive cyberattack for the X outages

Elon Musk said that the global outages impacting its platform X during the day are being caused by a cyberattack.…

3 weeks ago
North Korea-linked APT Moonstone used Qilin ransomware in limited attacksNorth Korea-linked APT Moonstone used Qilin ransomware in limited attacks

North Korea-linked APT Moonstone used Qilin ransomware in limited attacks

Microsoft researchers reported that North Korea-linked APT tracked as Moonstone Sleet has employed the Qilin ransomware in limited attacks. Microsoft…

3 weeks ago
Feds seized $23 million in crypto stolen using keys from LastPass breachesFeds seized $23 million in crypto stolen using keys from LastPass breaches

Feds seized $23 million in crypto stolen using keys from LastPass breaches

U.S. authorities seized $23M in crypto linked to a $150M Ripple wallet theft, experts believe the incident is linked to…

3 weeks ago
Security Affairs newsletter Round 514 by Pierluigi Paganini – INTERNATIONAL EDITIONSecurity Affairs newsletter Round 514 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs newsletter Round 514 by Pierluigi Paganini – INTERNATIONAL EDITION

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are free…

4 weeks ago
Mirai-based botnets exploit CVE-2025-1316 zero-day in Edimax IP camerasMirai-based botnets exploit CVE-2025-1316 zero-day in Edimax IP cameras

Mirai-based botnets exploit CVE-2025-1316 zero-day in Edimax IP cameras

Mirai-based botnets are exploiting a zero-day flaw, tracked as CVE-2025-1316, in Edimax IP cameras, to achieve remote command execution. US…

4 weeks ago
The Role of Differential Privacy in Protecting Sensitive Information in the Era of Artificial IntelligenceThe Role of Differential Privacy in Protecting Sensitive Information in the Era of Artificial Intelligence

The Role of Differential Privacy in Protecting Sensitive Information in the Era of Artificial Intelligence

Differential privacy (DP) protects data by adding noise to queries, preventing re-identification while maintaining utility, addressing Artificial Intelligence -era privacy…

4 weeks ago