Gajdek Graphics Blog
  • Blog Home Page
    • Logout
    • Log-In
  • Articles
    • IT Security
    • Graphics Design
  • Gajdek Graphics Home
  • Privacy Policy
Select Page
Can you spot a spy posing as a job seeker?

Can you spot a spy posing as a job seeker?

by Syndicated News Feed | Oct 28, 2025 | IT Security

Here’s what to know about a recent spin on an insider threat – fake North Korean IT workers infiltrating western firms 28 Oct 2025  •  , 5 min. read Back in July 2024, cybersecurity vendor KnowBe4 began to observe suspicious activity linked to a new hire. The...
Microsoft WSUS attacks hit ‘multiple’ orgs, Google warns • The Register

Microsoft WSUS attacks hit ‘multiple’ orgs, Google warns • The Register

by Syndicated News Feed | Oct 27, 2025 | IT Security

More threat intel teams are sounding the alarm about a critical Windows Server Update Services (WSUS) remote code execution vulnerability, tracked as CVE-2025-59287 and now under active exploitation, just days after Microsoft pushed an emergency patch and the US...
Google disputes false claims of massive Gmail data breach

Google disputes false claims of massive Gmail data breach

by Syndicated News Feed | Oct 27, 2025 | IT Security

Google was once again forced to announce that it had not suffered a data breach after numerous news outlets published sensational stories about a fake breach that purportedly exposed 183 million accounts. This claim began over the weekend and into today, with news...
Re-enroll 2FA security keys by November 10 or get locked out

Re-enroll 2FA security keys by November 10 or get locked out

by Syndicated News Feed | Oct 27, 2025 | IT Security

X is warning that users must re-enroll their security keys or passkeys for two-factor authentication (2FA) before November 10 or they will be locked out of their accounts until they do so. In a series of posts on X, the company says this change only affects users who...
Iran’s MOIS-linked Ravin Academy hit by data breach • The Register

Iran’s MOIS-linked Ravin Academy hit by data breach • The Register

by Syndicated News Feed | Oct 27, 2025 | IT Security

Iran’s school for state-sponsored cyberattackers admits it suffered a breach exposing the names and other personal information of its associates and students. The Ravin Academy was established in 2019, ostensibly to train individuals in all facets of...
CISA orders feds to patch Windows Server WSUS flaw used in attacks

CISA orders feds to patch Windows Server WSUS flaw used in attacks

by Syndicated News Feed | Oct 27, 2025 | IT Security

The Cybersecurity and Infrastructure Security Agency (CISA) ordered U.S. government agencies to patch a critical-severity Windows Server Update Services (WSUS) vulnerability after adding it to its catalog of security flaws exploited in attacks. Tracked as...
UN Cybercrime Treaty wins dozens of signatories • The Register

UN Cybercrime Treaty wins dozens of signatories • The Register

by Syndicated News Feed | Oct 26, 2025 | IT Security

The United Nations on Saturday staged a signing ceremony for the Convention against Cybercrime, the world’s first agreement to combat online crime. And while 72 nations picked up the pen, critics continue to point out the convention’s flaws. The Convention took five...
New CoPhish attack steals OAuth tokens via Copilot Studio agents

New CoPhish attack steals OAuth tokens via Copilot Studio agents

by Syndicated News Feed | Oct 25, 2025 | IT Security

A new phishing technique dubbed ‘CoPhish’ weaponizes Microsoft Copilot Studio agents to deliver fraudulent OAuth consent requests via legitimate and trusted Microsoft domains. The technique was developed by researchers at Datadog Security Labs, who warned...
MPs urge UK government to stop phone theft wave through tech • The Register

MPs urge UK government to stop phone theft wave through tech • The Register

by Syndicated News Feed | Oct 25, 2025 | IT Security

The UK’s Home Secretary should use her powers to push the tech industry to deploy stronger technical measures against the surge in phone thefts, according to a House of Commons committee. Metropolitan Police figures show 117,211 phones were stolen during 2024,...
Hackers launch mass attacks exploiting outdated WordPress plugins

Hackers launch mass attacks exploiting outdated WordPress plugins

by Syndicated News Feed | Oct 24, 2025 | IT Security

A widespread exploitation campaign is targeting WordPress websites with GutenKit and Hunk Companion plugins vulnerable to critical-severity, old security issues that can be used to achieve remote code execution (RCE). WordPress security firm Wordfence says that it...
« Older Entries
Next Entries »

Categories

  • Graphics Design (6)
  • IT Security (7,762)

Recent Posts

  • Landfall spyware used in 0-day attacks on Samsung phones • The Register 11/07/2025
  • Malicious NuGet packages drop disruptive ‘time bombs’ 11/07/2025
  • U.S. Congressional Budget Office hit by suspected foreign cyberattack 11/06/2025
  • Gootloader malware back for the attack, serves up ransomware • The Register 11/06/2025
  • How a ransomware gang encrypted Nevada government’s systems 11/06/2025
©2025 Gajdek Graphics
We employ cookies to guarantee an optimal experience on our website. For additional details, please refer to our privacy policy. By opting to utilize this site, you acknowledge and agree to our policy.