Critical Sudo Bug CVE-2025-32463 Lets Users Gain Root Access on Linux

Two newly discovered vulnerabilities in the Sudo utility have put millions of Linux and Unix systems at risk. These flaws allow local users, who normally have no special privileges, to gain root-level access to the system. Since Sudo is used by almost all major Linux distributions, this discovery has triggered serious security concerns. The most … Continued

Europe Launches Major Plan to Build Quantum-Secure Infrastructure

The European Union has officially launched a bold new initiative called the Quantum Europe Strategy. This plan aims to make Europe a global leader in quantum technology by 2030, focusing on both innovation and cybersecurity. With quantum computing advancing quickly, the EU wants to prepare its infrastructure to stay safe and competitive in the digital … Continued

Founder Spotlight: Stories Shaping Cybersecurity

Matthew Fox With RiskApp Matthew Fox, Co-founder of RiskApp, is a cybersecurity entrepreneur building AI-driven solutions to transform security compliance. Together with co-founder Rafael Carvalho, he launched RiskApp in 2023 after facing firsthand how outdated, slow, and painful audit processes can be. Their mission was clear: create a platform that makes compliance easier, faster, and … Continued

Top 10 Sessions to Catch at Black Hat USA 2025

Cyber threats are evolving fast and staying ahead means learning from the best. That’s exactly why thousands of cybersecurity professionals, ethical hackers, and tech leaders will gather in Las Vegas from August 3 to 8, 2025, for Black Hat USA 2025. Celebrating its 28th year, Black Hat is more than just a conference; it’s where the … Continued

Stealthy Firefox Extensions Drain Crypto Wallets in Ongoing Campaign

A major security warning has surfaced for cryptocurrency users after researchers uncovered over 40 malicious extensions on the Mozilla Firefox Add-ons Store. These extensions were not harmless tools, they were dangerous fakes created to steal users’ crypto wallet information, including secret keys and seed phrases. Many of these fake add-ons managed to stay on the … Continued

Chinese Hackers Exploit Ivanti Zero-Days to Target French Government

Recently, a Chinese hacking group exploited multiple zero-day vulnerabilities in lvanti’s Connect Secure Appliance (CSA) to target sensitive organizations in France. This includes the French government, telecom providers, and companies from sectors like transport, finance, and media. The hacking campaign was discovered in September 2024 and has been linked to a threat group known as … Continued

Your Survival Guide to Black Hat USA 2025: Events, Expo and Essentials

📍 Location: Mandalay Bay Convention Center, Las Vegas 📅 Dates: August 2–7, 2025   📲Download the Black Hat Events App This app will help you: Build and manage your personal schedule Connect with other attendees Navigate the venue with maps Browse sponsor profiles Discover extra event info like networking, Bookstore hours, Meet & Greet sessions, … Continued

Cisco Unified CM Vulnerability Exposes Systems to Remote Root Access

A critical vulnerability has been discovered in Cisco’s Unified Communications Manager (Unified CM) and Session Management Edition (SME), which allows an attacker to gain root access without any authentication. This means that someone sitting anywhere in the world could take complete control of a vulnerable system, simply by exploiting a flaw in the software. The … Continued

Newsletter line