by Syndicated News Feed | Dec 18, 2025 | IT Security |
Chinese authorities on Thursday certified the China Environment for Network Innovation (CENI), a vast research network that Beijing hopes will propel the country to the forefront of networking research. As reported in Chinese state media, tests of the network saw it...
by Syndicated News Feed | Dec 18, 2025 | IT Security |
Hackers gained access to an online coding repository belonging to the University of Sydney and stole files with personal information of staff and students. The institution said the breach was limited to a single system and was detected last week. It promptly shut down...
by Syndicated News Feed | Dec 18, 2025 | IT Security |
SonicWall has warned customers of a zero-day flaw in its SMA 1000 remote-access appliance that’s being actively exploited, potentially allowing attackers to escalate privileges and take over boxes. The bug, tracked as CVE-2025-40602, resides in the appliance...
by Syndicated News Feed | Dec 18, 2025 | IT Security |
Hewlett Packard Enterprise (HPE) has patched a maximum-severity vulnerability in its HPE OneView software that enables attackers to execute arbitrary code remotely. OneView is HPE’s infrastructure management software that helps IT admins streamline operations...
by Syndicated News Feed | Dec 18, 2025 | IT Security |
In 2024, ESET researchers noticed previously undocumented malware in the network of a Southeast Asian governmental entity. This led us to uncover even more new malware on the same system, none of which had substantial ties to any previously tracked threat actors....
by Syndicated News Feed | Dec 17, 2025 | IT Security
The Zeroday Cloud hacking competition in London has awarded researchers $320,000 for demonstrating critical remote code execution vulnerabilities in components used in cloud infrastructure. The first hacking event focused on cloud systems, the competition is hosted...
by Syndicated News Feed | Dec 17, 2025 | IT Security
Suspected Chinese-government-linked threat actors have been battering a maximum-severity Cisco AsyncOS zero-day vulnerability in some Secure Email Gateway (SEG) and Secure Email and Web Manager (SEWM) appliances for nearly a month, and there’s no timeline for a...
by Syndicated News Feed | Dec 17, 2025 | IT Security
In proposing a settlement agreement, the Federal Trade Commission (FTC) says that Illusory Systems must repay users funds lost in a 2022 cyberattack. Illusory Systems, which trades as Nomad, allegedly misled users about the security of its cryptocurrency bridge, which...
by Syndicated News Feed | Dec 16, 2025 | IT Security
Chinese espionage crew Ink Dragon has expanded its snooping activities into European government networks, using compromised servers to create illicit relay nodes for future operations. The campaign has hit “several dozen victims,” Check Point Software...
by Syndicated News Feed | Dec 16, 2025 | IT Security
A new Android malware-as-a-service (MaaS) named Cellik is being advertised on underground cybercrime forums offering a robust set of capabilities that include the option to embed it in any app available on the Google Play Store. Specifically, attackers can select apps...