Qualcomm Fixes 3 Zero-Days Used in Targeted Android Attacks via Adreno GPU

Qualcomm has shipped security updates to address three zero-day vulnerabilities…

Download the ‘New Thinking about Cloud Computing’ Enterprise Spotlight

Download the June 2025 issue of the Enterprise Spotlight from…

Preinstalled Android Apps Found Leaking PINs and Executing Malicious Commands

On May 30, 2025, CERT Polska coordinated the public disclosure…

Critical Bugs Could Spark Takeover of Widely Used Fire Safety OT/ICS Platform

The unpatched security vulnerabilities in Consilium Safety's CS5000 Fire Panel…

In the AI Race With China, Don’t Forget About Security

The US needs to establish a clear framework to provide…

Apache Roller Vulnerability Allows Hackers to Bypass Access Controls

A newly disclosed vulnerability in Apache Roller, the popular open-source…

Industry Asks for Clarity on Proposed HIPAA Cybersecurity Rules

Healthcare and IT security practitioners worry some of the proposed…

How AI Is Transforming SASE, Zero Trust for Modern Enterprises

By automating security policies and threat detection while coaching users…

Microsoft Telnet Server Flaw Lets Attackers Bypass Guest Login Restrictions

A newly disclosed vulnerability in Microsoft’s Telnet Server component is…

Pentesters: Is AI Coming for Your Role?

We’ve been hearing the same story for years: AI is…

Bybit Hot Wallet Exploit for Malicious Transaction – Technical Analysis Released

Researchers uncovered one of the most technically sophisticated attacks in cryptocurrency history, exploiting Bybit’s Ethereum hot wallet infrastructure through a malicious proxy contract upgrade.  The […]