Today is Microsoft’s February 2025 Patch Tuesday, which includes security updates for 55 flaws, including four zero-day vulnerabilities, with two actively exploited in attacks. […]
Author Archives: [email protected]
Fortinet warned today that attackers are exploiting another authentication bypass zero-day bug in FortiOS and FortiProxy to hijack Fortinet firewalls and breach enterprise networks. […]
Microsoft has released Windows 11 KB5051987 and KB5051989 cumulative updates for versions 24H2 and 23H2 to fix security vulnerabilities and issues. […]
Learn more about how Google for Education is focusing on digital safety for Safer Internet Day 2025.
Learn how advanced AI and machine learning models help Enhanced Protection mode of Safe Browsing keep you safe on the web.
The Sandworm Russian military cyber-espionage group is targeting Windows users in Ukraine with trojanized Microsoft Key Management Service (KMS) activators and fake Windows updates. […]
COSTA MESA, Calif., and REDMOND, Wash. — Feb. 11, 2025 — Microsoft Corp. and Anduril Industries, a leader in defense technology, today announced an expanded partnership to drive the next phase of the U.S. Army’s Integrated Visual Augmentation System (IVAS) program. Through this partnership agreement, and pending Department of Defense approval, Anduril will assume oversight […]
Security researchers at Bishop Fox have published complete exploitation details for the CVE-2024-53704 vulnerability that allows bypassing the authentication mechanism in certain versions of the SonicOS SSLVPN application. […]
The U.S. Justice Department announced the names of two Phobos ransomware affiliates arrested yesterday in Thailand, charging them on 11 counts due to their involvement in more than a thousand cyberattacks. […]
Google has stepped in to clarify that a newly introduced Android System SafetyCore app does not perform any client-side scanning of content. “Android provides many on-device protections that safeguard users against threats like malware, messaging spam and abuse protections, and phone scam protections, while preserving user privacy and keeping users in control of their data,” […]