information security news

New Ballista Botnet spreads using TP-Link flaw. Is it an Italian job?New Ballista Botnet spreads using TP-Link flaw. Is it an Italian job?

New Ballista Botnet spreads using TP-Link flaw. Is it an Italian job?

The Ballista botnet is exploiting an unpatched TP-Link vulnerability, targeting over 6,000 Archer routers, Cato CTRL researchers warn. Cato CTRL…

2 months ago
Apple fixed the third actively exploited zero-day of 2025Apple fixed the third actively exploited zero-day of 2025

Apple fixed the third actively exploited zero-day of 2025

Apple addressed a zero-day vulnerability, tracked as CVE-2025-24201, that has been exploited in "extremely sophisticated" cyber attacks. Apple has released…

2 months ago
Switzerland’s NCSC requires cyberattack reporting for critical infrastructure within 24 hoursSwitzerland’s NCSC requires cyberattack reporting for critical infrastructure within 24 hours

Switzerland’s NCSC requires cyberattack reporting for critical infrastructure within 24 hours

Switzerland's NCSC mandates critical infrastructure organizations to report cyberattacks within 24 hours of discovery. Switzerland's National Cybersecurity Centre (NCSC) now…

2 months ago
SideWinder APT targets maritime and nuclear sectors with enhanced toolsetSideWinder APT targets maritime and nuclear sectors with enhanced toolset

SideWinder APT targets maritime and nuclear sectors with enhanced toolset

The APT group SideWinder targets maritime and logistics companies across South and Southeast Asia, the Middle East, and Africa. Kaspersky…

2 months ago
U.S. CISA adds Advantive VeraCore and Ivanti EPM flaws to its Known Exploited Vulnerabilities catalog<gwmw style="display:none;"></gwmw>U.S. CISA adds Advantive VeraCore and Ivanti EPM flaws to its Known Exploited Vulnerabilities catalog<gwmw style="display:none;"></gwmw>

U.S. CISA adds Advantive VeraCore and Ivanti EPM flaws to its Known Exploited Vulnerabilities catalog<gwmw style="display:none;"></gwmw>

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Advantive VeraCore and Ivanti EPM flaws to its Known Exploited Vulnerabilities catalog. The U.S.…

2 months ago
Cybersecurity Challenges in Cross-Border Data Transfers and Regulatory Compliance StrategiesCybersecurity Challenges in Cross-Border Data Transfers and Regulatory Compliance Strategies

Cybersecurity Challenges in Cross-Border Data Transfers and Regulatory Compliance Strategies

Cross-border data transfers enable global business but face challenges from varying cybersecurity laws, increasing risks of cyberattacks and data breaches.…

2 months ago
Elon Musk blames a massive cyberattack for the X outagesElon Musk blames a massive cyberattack for the X outages

Elon Musk blames a massive cyberattack for the X outages

Elon Musk said that the global outages impacting its platform X during the day are being caused by a cyberattack.…

2 months ago
Experts warn of mass exploitation of critical PHP flaw CVE-2024-4577Experts warn of mass exploitation of critical PHP flaw CVE-2024-4577

Experts warn of mass exploitation of critical PHP flaw CVE-2024-4577

Threat actors exploit PHP flaw CVE-2024-4577 for remote code execution. Over 1,000 attacks detected globally. GreyNoise researchers warn of a…

2 months ago
RansomHouse gang claims the hack of the Loretto Hospital in ChicagoRansomHouse gang claims the hack of the Loretto Hospital in Chicago

RansomHouse gang claims the hack of the Loretto Hospital in Chicago

Another American hospital falls victim to a ransomware attack; the RansomHouse gang announced the hack of Loretto Hospital in Chicago."…

2 months ago
Large-scale cryptocurrency miner campaign targets Russian users with SilentCryptoMinerLarge-scale cryptocurrency miner campaign targets Russian users with SilentCryptoMiner

Large-scale cryptocurrency miner campaign targets Russian users with SilentCryptoMiner

Experts warn of a large-scale cryptocurrency miner campaign targeting Russian users with SilentCryptoMiner. Kaspersky researchers discovered a mass malware campaign…

2 months ago