Critical RCE Vulnerability Found in Cisco Secure Firewall Management Software

August 15, 2025 — Cisco has announced a severe security flaw in its Secure Firewall [...]

Zero Trust and AI: Redefining Privacy in the Era of Autonomous Agents

August 15, 2025 — Traditional views of privacy focused on control: walls, permissions, and access [...]

Italian Hotels Compromised, Tens of Thousands of Guest IDs Stolen and Sold Online

August 15, 2025 — Italy’s Computer Emergency Response Team (CERT-AGID) has issued a warning after [...]

U.S. Targets Garantex and Grinex Over $100M in Illicit Crypto Transactions Linked to Ransomware

August 15, 2025 — The U.S. Department of the Treasury’s Office of Foreign Assets Control [...]

Tight Budgets Push Cybersecurity Toward AI-Driven Automation

With financial constraints weighing heavily on cybersecurity teams, organizations are increasingly leaning on AI-powered automation [...]

Researchers Demonstrate Passkey Login Bypass Through WebAuthn Manipulation

Security researchers at SquareX, an enterprise browser security firm, have revealed a method that allows [...]

KernelSU v0.5.7 Vulnerability Allows Android Apps to Gain Root Privileges

Cybersecurity researchers have uncovered a critical flaw in KernelSU version 0.5.7 that could allow malicious [...]

New Android Malware Wave Targets Banking Customers with NFC Relay, Call Hijacking, and Root Exploits

Cybersecurity researchers have uncovered a new wave of Android malware, dubbed PhantomCard, which exploits near-field [...]

WhatsApp Introduces New Features for Smarter and More Interactive Group Calls

WhatsApp has rolled out new capabilities aimed at making group calls easier to schedule and [...]

Hackers Leverage CrossC2 to Bring Cobalt Strike Beacon to Linux and macOS

August 14, 2025 – Japan’s Computer Emergency Response Team Coordination Center (JPCERT/CC) has disclosed a [...]