Qantas cuts executive bonuses by 15% after a July data breach

5 months ago

Qantas cuts executive bonuses by 15% after a July cyberattack exposed data of 5.7M people, despite reporting $1.5B profit last…

MeetC2 – A serverless C2 framework that leverages Google Calendar APIs as a communication channel

5 months ago

MeetC2 is a PoC C2 tool using Google Calendar to mimic cloud abuse, helping teams test detection, logging, and response.…

Critical SAP S/4HANA flaw CVE-2025-42957 under active exploitation

5 months ago

Experts warn of an actively exploited vulnerability, tracked as CVE-2025-42957 (CVSS score: 9.9), in SAP S/4HANA software. A critical command injection vulnerability,…

U.S. CISA adds Sitecore, Android, and Linux flaws to its Known Exploited Vulnerabilities catalog

5 months ago

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Sitecore, Android, and Linux flaws to its Known Exploited Vulnerabilities catalog. The…

SVG files used in hidden malware campaign impersonating Colombian authorities

5 months ago

VirusTotal uncovered an undetected malware campaign using SVG files that impersonated the Colombian justice system. VirusTotal researchers uncovered a phishing…

France’s CNIL fined Google $379M and Shein $175M for breaching cookie rules

5 months ago

France’s data watchdog fined Google $379M (€325 million) and Shein $175M (€150 million) for breaching cookie rules. The French data…

$10M reward for Russia’s FSB officers accused of hacking US Critical infrastructure

5 months ago

US offers $10M for Russian FSB officers Tyukov, Gavrilov & Akulov, accused of attacking US critical infrastructure and over 500…

Severe Hikvision HikCentral product flaws: What You Need to Know

5 months ago

Hikvision HikCentral flaw allows unauthenticated users to gain admin rights, risking full control over configs, logs, and critical monitoring. Security…

U.S. CISA adds TP-Link Archer C7(EU) and TL-WR841N flaws to its Known Exploited Vulnerabilities catalog<gwmw style="display: none; background-color: transparent;"></gwmw><gwmw style="display:none;"></gwmw>

5 months ago

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds TP-Link Archer C7(EU) and TL-WR841N flaws to its Known Exploited Vulnerabilities catalog. The…

Crooks turn HexStrike AI into a weapon for fresh vulnerabilities

5 months ago

Threat actors abuse HexStrike AI, a new offensive security tool meant for red teaming and bug bounties, to exploit fresh…

This website uses cookies.