Search results for: “ransomware”
Showing results matching your search
Refine your search
-
US Agencies Propose Ban on TP-Link Networking Devices Over Security Concerns
The US government is reportedly considering a ban on TP-Link networking devices due to national security concerns, following an investigation by federal agencies. This move could significantly impact the consumer networking market, given TP-Link’s dominant…
·
·
2–3 minutes -
Brash Exploit Uncovers Critical Chromium Blink Vulnerability
A newly discovered exploit, dubbed ‘Brash,’ has revealed a critical architectural vulnerability within the Chromium Blink rendering engine, capable of causing a system-level denial of service across a wide range of Chromium-based browsers globally. This…
·
·
3–4 minutes -
Australian Clinical Labs Fined A$5.8 Million for Medlab Pathology Data Breach
Australian Clinical Labs (ACL) has been ordered to pay a A$5.8 million civil penalty for a data breach at its subsidiary, Medlab Pathology, marking a first under Australia’s Privacy Act.
·
·
2–3 minutes -
CISA Directs Federal Agencies to Patch Actively Exploited VMware Vulnerability by Chinese Threat Actor UNC5174
CISA directs federal agencies to patch a high-severity VMware vulnerability, CVE-2025-41244, actively exploited by the Chinese state-sponsored threat actor UNC5174 since October 2024. All organizations are urged to prioritize patching due to its frequent use…
·
·
2–3 minutes -
NFC Relay Malware Exploits Android Tap-to-Pay for Fraudulent Transactions
Zimperium zLabs has discovered hundreds of malicious Android apps using NFC relay and Host Card Emulation to steal payment data from tap-to-pay transactions, turning infected phones into tools for payment fraud.
·
·
2–3 minutes -
What Is a Remote Code Execution (RCE) Vulnerability?
Remote Code Execution (RCE) vulnerabilities allow attackers to run arbitrary code on remote systems—often leading to full compromise. Learn how RCE works and how to mitigate it.
·
·
2–3 minutes -
What Is Bring Your Own Vulnerable Driver (BYOVD)?
Bring Your Own Vulnerable Driver (BYOVD) is a technique that leverages signed but vulnerable drivers to gain kernel-level access and evade security controls.
·
·
2–3 minutes -
CVE-2025-59287: Actively Exploited WSUS Remote Code Execution Vulnerability Triggers Emergency Patching
CISA and security researchers warn of active exploitation of CVE-2025-59287, a critical WSUS RCE vulnerability prompting emergency patching across enterprise systems.
·
·
1–2 minutes -
LockBit 5.0 resurfaces with multi-platform payloads; H-ISAC warns healthcare sector
H‑ISAC and vendor research this October flag LockBit 5.0, which targets Windows, Linux and ESXi; organisations — especially healthcare — are urged to prioritise detection, backups and patching.
·
·
1–2 minutes -
Dutch Public Health Agency RIVM Restores Website After Hackers Posted Fake Information
The RIVM took its website offline after hackers posted false content through a vulnerable web form; operations have since been restored.
·
·
1–2 minutes







