What is CTEM? Continuous threat exposure management (CTEM) is a security approach that helps companies to continuously identify and manage threats in their IT environment. […]
Google Rolls Out On-Device AI Protections to Detect Scams in Chrome and Android
Google on Thursday announced it’s rolling out new artificial intelligence (AI)-powered countermeasures to combat scams across Chrome, Search, and Android. The tech giant said it […]
China-Backed Hackers Target Exiled Uyghur Community with Malicious Software
Senior members of the World Uyghur Congress (WUC) living in exile were targeted with a sophisticated spearphishing campaign delivering malware through a seemingly legitimate Uyghur […]
SonicWall Unveils New Firewalls and Comprehensive Managed Cybersecurity Service
SonicWall has unveiled a new line of advanced firewalls and a comprehensive managed cybersecurity service designed to combat the evolving threat landscape, with particular emphasis […]
160-Year-Old Haulage Firm Falls After Cyber-Attack: Director Issues Urgent Warning
The 160-year-old haulage giant Knights of Old, once a stalwart of the UK’s logistics sector, was forced into administration in 2023 following a devastating cyber-attack […]
Nomad Bridge Hacker Apprehended in Connection with $190 Million Heist
Alexander Gurevich, a 47-year-old dual Russian-Israeli citizen, was arrested last Thursday at Ben-Gurion Airport while attempting to flee to Russia under a new identity. Gurevich […]
Microsoft Launches “Copilot+ PC” for an Upgraded Windows Experience
Microsoft has announced a significant wave of new Windows experiences designed for Copilot+ PCs, which the company describes as “the fastest, most intelligent and most […]
Fedora Linux Joins the Windows Subsystem for Linux Officially
Fedora Project has announced the official availability of Fedora Linux on the Windows Subsystem for Linux (WSL), marking a significant expansion of Fedora’s ecosystem. Starting […]
FBI Warns Hackers Are Using End-of-Life Routers to Mask Their Tracks
The Federal Bureau of Investigation (FBI) has issued a stark warning to businesses and home users: cybercriminals are actively exploiting outdated, unsupported routers to hide […]
Chinese Hackers Exploit SAP RCE Flaw CVE-2025-31324, Deploy Golang-Based SuperShell
A China-linked unnamed threat actor dubbed Chaya_004 has been observed exploiting a recently disclosed security flaw in SAP NetWeaver. Forescout Vedere Labs, in a report […]