VMware fixed four vulnerabilities in VMware ESXi, Workstation, Fusion, and Tools that were exploited as zero-days during the Pwn2Own Berlin 2025 hacking contest in May 2025. […] Go to Source Author: Lawrence Abrams
Category Archives: Security
The Matanbuchus malware loader has been seen being distributed through social engineering over Microsoft Teams calls impersonating IT helpdesk. […] Go to Source Author: Bill Toulas
Google has filed a lawsuit against the anonymous operators of the Android BadBox 2.0 malware botnet, accusing them of running a global ad fraud scheme against the company’s advertising platforms. […] Go to Source Author: Lawrence Abrams
A novel malware family named LameHug is using a large language model (LLM) to generate commands to be executed on compromised Windows systems. […] Go to Source Author: Bill Toulas
Cryptocurrency exchange BigONE announced that it suffered a security breach, in which hackers stole various digital assets valued at $27 million. […] Go to Source Author: Bill Toulas
The Chinese state-sponsored hacking group known as Salt Typhoon breached and remained undetected in a U.S. Army National Guard network for nine months in 2024, stealing network configuration files and administrator credentials that could be used to compromise other government networks. […] Go to Source Author: Lawrence Abrams
A critical vulnerability (CVE-2025-20337) in Cisco’s Identity Services Engine (ISE) could be exploited to let an unauthenticated attacker store malicious files, execute arbitrary code, or gain root privileges on vulnerable devices. […] Go to Source Author: Bill Toulas
2025July16Security_A, account protection, biometrics, cybersecurity, digital security, Encryption, General Articles A, passkey technology, passkeys, password alternatives, public key cryptography, secure authentication, Security, Two factor Authentication
Passkeys explained: The key to safer, smarter online authentication
As the digital world becomes increasingly complex, finding ways to protect personal and business information is more important than ever. Traditional passwords have long been the go-to solution for securing online accounts, but they come with a variety of vulnerabilities. Passkeys offer a more secure and streamlined alternative, reducing the risks associated with passwords and […]
2025July16Security_C, account protection, biometrics, cybersecurity, digital security, Encryption, General Articles C, passkey technology, passkeys, password alternatives, public key cryptography, secure authentication, Security, Two factor Authentication
How passkeys are changing the way we secure our digital lives
With growing concerns over online security, the need for stronger authentication methods is more pressing than ever. Fortunately, passkeys offer a breakthrough in how we authenticate our identities, moving beyond traditional passwords with a technology that is both more secure and user-friendly. What are passkeys? Passkeys are a modern form of digital authentication that uses […]
Passwords are often the weakest link in security, prone to being hacked or stolen. A more secure alternative are passkeys, which offer a simplified and more reliable authentication method. This blog will guide you through the basics of passkeys, how they enhance security, and how you can start using them on your devices and apps. […]



