Security News > 2025 > March

Top Tech Conferences & Events to Add to Your Calendar in 2025
2025-03-31 14:00

A great way to stay current with the latest technology trends and innovations is by attending conferences. Read and bookmark our tech events guide.

CISA reveals new malware variant used on compromised Ivanti Connect Secure devices
2025-03-31 13:02

CISA has released indicators of compromise, detection signatures, and updated mitigation advice for rooting out a newly identified malware variant used by the attackers who breached Ivanti Connect...

EU invests €1.3 billion in AI and cybersecurity
2025-03-31 12:33

The European Commission has approved the 2025-2027 Digital Europe Programme (DIGITAL) work program, allocating €1.3 billion to advance key technologies essential for the EU’s future and...

Hackers Exploit WordPress mu-Plugins to Inject Spam and Hijack Site Images
2025-03-31 12:04

Threat actors are using the "mu-plugins" directory in WordPress sites to conceal malicious code with the goal of maintaining persistent remote access and redirecting site visitors to bogus sites....

⚡ Weekly Recap: Chrome 0-Day, IngressNightmare, Solar Bugs, DNS Tactics, and More
2025-03-31 11:25

Every week, someone somewhere slips up—and threat actors slip in. A misconfigured setting, an overlooked vulnerability, or a too-convenient cloud tool becomes the perfect entry point. But what...

The Signal Chat Leak and the NSA
2025-03-31 11:04

US National Security Advisor Mike Waltz, who started the now-infamous group chat coordinating a US attack against the Yemen-based Houthis on March 15, is seemingly now suggesting that the secure...

5 Impactful AWS Vulnerabilities You're Responsible For
2025-03-31 11:00

If you're using AWS, it's easy to assume your cloud security is handled - but that's a dangerous misconception. AWS secures its own infrastructure, but security within a cloud environment remains...

Cloud security explained: What’s left exposed?
2025-03-31 10:00

Think AWS has security covered? Think again. Discover real-world examples of what it doesn’t secure and how to protect your environment Advertorial AWS customers might assume that security is...

Windows 11 quick machine recovery: Restoring devices with boot issues
2025-03-31 09:41

Microsoft has rolled out quick machine recovery, a new Windows feature aimed at preventing prolonged widespread outages like the one caused by a faulty CrowdStrike update in July 2024. The goal of...

Russia-Linked Gamaredon Uses Troop-Related Lures to Deploy Remcos RAT in Ukraine
2025-03-31 09:30

Entities in Ukraine have been targeted as part of a phishing campaign designed to distribute a remote access trojan called Remcos RAT. "The file names use Russian words related to the movement of...