Researchers Link CACTUS Ransomware Tactics to Former Black Basta Affiliates
“Once infiltrated, it grants attackers a wide range of remote control capabilities, allowing them to execute
Intel TDX Connect Bridges the CPU-GPU Security Gap
AI is all about data – and keeping AI’s data confidential both within devices and between devices is problematic. Intel offers a solution.
The post Intel TDX Connect Bridges the CPU-GPU Security Gap appeared first on SecurityWeek.
New polyglot malware hits aviation, satellite communication firms
AI Asset Inventories: The Only Way to Stay on Top of a Lightning-fast Landscape
Unauthorized AI usage is a ticking time bomb. A tool that wasn’t considered a risk yesterday may introduce new AI-powered features overnight.
The post AI Asset Inventories: The Only Way to Stay on Top of a Lightning-fast Landscape appeared first on SecurityWeek.
Polish Space Agency offline as it recovers from cyberattack
Hunters International ransomware claims attack on Tata Technologies
Aryon Security Debuts With Platform to Prevent Cloud Misconfigurations
Misconfigurations are the cause of most cloud breaches. Aryon is on a mission to prevent them.
The post Aryon Security Debuts With Platform to Prevent Cloud Misconfigurations appeared first on SecurityWeek.
VMware Security Flaws Exploited in the Wild—Broadcom Releases Urgent Patches
The list of vulnerabilities is as follows –
CVE-2025-22224 (CVSS score: 9.3) – A Time-of-Check Time-of-Use (TOCTOU) vulnerability that leads to an out-of-bounds write, which a malicious actor with
