by Syndicated News Feed | Jul 3, 2025 | IT Security
A mysterious piece of “under development” code is playing havoc with the Windows Firewall after the latest preview update for Windows 11 24H2. The problem manifests as an error in the Event Viewer for Windows Firewall With Advanced Security and can occur...
by Syndicated News Feed | Jul 3, 2025 | IT Security
Young Consulting’s cybersecurity woes continue after the number of affected individuals from last year’s suspected ransomware raid passed the 1 million mark. The software vendor to stop-loss insurance carriers, now trading as Connexure, said the attack...
by Syndicated News Feed | Jul 3, 2025 | IT Security
Meta has come out swinging following the European Commission’s decision that its pay-or-consent model falls foul of the Digital Markets Act (DMA). In a post, the company stated: “This decision is both incorrect and unlawful, and we are appealing it.”...
by Syndicated News Feed | Jul 3, 2025 | IT Security
Ransomware gang Hunters International has shut up shop and offered decryption keys to all victims as a parting favor. Announcing the news on Thursday morning, the gang deleted all victim data from its dark web leak site and issued a statement confirming its closure....
by Syndicated News Feed | Jul 3, 2025 | IT Security
Deep cuts in cybersecurity spending risk creating ripple effects that will put many organizations at a higher risk of falling victim to cyberattacks 03 Jul 2025 • , 4 min. read We often hear about cybersecurity fatigue, the mental and emotional strain that weighs on...
by Syndicated News Feed | Jul 2, 2025 | IT Security
If you’re running the Engineering-Special (ES) builds of Cisco Unified Communications Manager or its Session Management Edition, you need to apply Cisco’s urgent patch after someone at Switchzilla made a big mistake. Cisco Unified Communications Manager...
by Syndicated News Feed | Jul 2, 2025 | IT Security
North Korean state-backed hackers have been using a new family of macOS malware called NimDoor in a campaign that targets web3 and cryptocurrency organizations. Researchers analyzing the payloads discovered that the attacker relied on unusual techniques and a...
by Syndicated News Feed | Jul 2, 2025 | IT Security
The Forminator plugin for WordPress is vulnerable to an unauthenticated arbitrary file deletion flaw that could enable full site takeover attacks. The security issue is tracked as CVE-2025-6463 and has a high-severity impact (CVSS 8.8 score). It impacts all versions...
by Syndicated News Feed | Jul 2, 2025 | IT Security
Security experts have uncovered a hole in Cl0p’s data exfiltration tool that could potentially leave the cybercrime group vulnerable to attack. The vulnerability in the Python-based software, which was used in the 2023-2024 MOVEit mass data raids, was discovered...
by Syndicated News Feed | Jul 2, 2025 | IT Security
ESET Research analyzes Gamaredon’s updated cyberespionage toolset, new stealth-focused techniques, and aggressive spearphishing operations observed throughout 2024 02 Jul 2025 • , 6 min. read Since Russia’s full-scale invasion of Ukraine in February 2022,...