Research has uncovered three significant vulnerabilities in Google’s Gemini AI assistant suite, dubbed the “Gemini Trifecta,” that could have allowed cybercriminals to steal users’ saved […]
MatrixPDF Campaign Evades Gmail Filters to Deliver Malicious Payloads
Cybercriminals are turning a trusted file format against users in a sophisticated new attack campaign. MatrixPDF represents a concerning evolution in social engineering attacks that […]
Top 10 Best Autonomous Endpoint Management Software In 2025
Managing endpoints effectively has become one of the most critical priorities for IT teams across organizations. With the growing number of devices, operating systems, and […]
Microsoft Sentinel Launches AI-Driven Agentic SIEM Platform for Enterprise Security
Organizations face an ever-evolving cyberthreat landscape marked by faster, more complex attacks. Today, Microsoft is answering this call with the general availability of an agentic security platform […]
Government shutdown deepens US cyber risk, exposing networks to threat actors
At midnight on Sept. 30, the US government shut down for the first time since 2018, when Donald Trump shuttered all but essential government functions […]
48+ Cisco Firewalls Hit by Actively Exploited 0-Day Vulnerability
Cisco has confirmed two serious vulnerabilities impacting its Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) firewalls. Tracked as CVE-2025-20333 and CVE-2025-20362, both issues allow attackers to […]
Cisco IOS/IOS XE SNMP Vulnerabilities Exploited in Ongoing Attacks, Warns CISA
The Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning about critical vulnerabilities in Cisco’s IOS and IOS XE Software SNMP subsystem that are […]
CISA 2015 cyber threat info-sharing law lapses amid government shutdown
Ten years ago, Congress passed a major cybersecurity bill called the Cybersecurity Information Sharing Act of 2015 (CISA 2015) to empower the federal government to […]
Wie CISOs schlechte Produkte enttarnen
Drum prüfe… Ground Picture | shutterstock.com Security-Anbietern stehen viele Wege offen, um CISOs und Sicherheitsentscheider mit Lobpreisungen und Angeboten zu ihren jeweils aktuellen Produkten und […]
Don’t drink or drive, say cyberattackers
When cybercriminals can shut down both a luxury carmaker and a major beer producer in the same month, it’s clear that no sector is safe […]