Cybersecurity Information Sharing Act of 2015 Reauthorized Through September 2026

Ashden Fein, Jess Gonzalez Valenzuela, Analese Bridges, John Webster Leslie, and Claire O’Rourke of Covington and Burling write: The Cybersecurity Information Sharing Act of 2015 (“CISA 2015”), which provides liability protections and other safeg… Continue reading Cybersecurity Information Sharing Act of 2015 Reauthorized Through September 2026

Ivanti Patches Endpoint Manager Vulnerabilities Disclosed in October 2025

It also fixed a high-severity authentication bypass that could be exploited remotely without authentication to obtain credentials.
The post Ivanti Patches Endpoint Manager Vulnerabilities Disclosed in October 2025 appeared first on SecurityWeek.
Continue reading Ivanti Patches Endpoint Manager Vulnerabilities Disclosed in October 2025

Exposed Training Open the Door for Crypto-Mining in Fortune 500 Cloud Environments

Intentionally vulnerable training applications are widely used for security education, internal testing, and product demonstrations. Tools such as OWASP Juice Shop, DVWA, Hackazon, and bWAPP are designed to be insecure by default, making them useful fo… Continue reading Exposed Training Open the Door for Crypto-Mining in Fortune 500 Cloud Environments

Posted in Uncategorized

UPCOMING WEBINAR – Satisfying The Landeck Ruling With Advanced Search Profiles In ADF Pro

Join ADF Solutions on 18 February to unpack the European Court’s Landeck ruling, learn how to minimise collateral intrusion, and strengthen your mobile device investigations with ADF Pro — register now to secure your spot. Continue reading UPCOMING WEBINAR – Satisfying The Landeck Ruling With Advanced Search Profiles In ADF Pro

Chipmaker Patch Tuesday: Over 80 Vulnerabilities Addressed by Intel and AMD

More than two dozen advisories have been published by the chip giants for vulnerabilities found recently in their products.
The post Chipmaker Patch Tuesday: Over 80 Vulnerabilities Addressed by Intel and AMD appeared first on SecurityWeek.
Continue reading Chipmaker Patch Tuesday: Over 80 Vulnerabilities Addressed by Intel and AMD

Google Search introduces new ways to remove sensitive personal information and explicit images

Google expanded its “Results about you” tool to give users more control over sensitive personal information and added a way to request removal of non-consensual explicit images from Search. Manage and limit sensitive personal information in Search User… Continue reading Google Search introduces new ways to remove sensitive personal information and explicit images

Microsoft Patches 59 Vulnerabilities Including Six Actively Exploited Zero-Days

Microsoft on Tuesday released security updates to address a set of 59 flaws across its software, including six vulnerabilities that it said have been exploited in the wild.
Of the 59 flaws, five are rated Critical, 52 are rated Important, and two are r… Continue reading Microsoft Patches 59 Vulnerabilities Including Six Actively Exploited Zero-Days

Posted in Uncategorized

Spam and phishing in 2025

The report contains statistics on spam and phishing in 2025, outlining the main trends: phishing and scam QR codes, ClickFix attacks, ChatGPT subscription lures and others. Continue reading Spam and phishing in 2025

SSHStalker Botnet Uses IRC C2 to Control Linux Systems via Legacy Kernel Exploits

Cybersecurity researchers have disclosed details of a new botnet operation called SSHStalker that relies on the Internet Relay Chat (IRC) communication protocol for command-and-control (C2) purposes.
“The toolset blends stealth helpers with legacy-era … Continue reading SSHStalker Botnet Uses IRC C2 to Control Linux Systems via Legacy Kernel Exploits

Posted in Uncategorized