Docker Compose Security Alert: CVE-2025-62725 Requires v2.40.2
Docker Compose CVE-2025-62725 enables path traversal that can overwrite host files from malicious compose artifacts. Update to v2.40.2, restrict sources, and audit caches.
Docker Compose CVE-2025-62725 enables path traversal that can overwrite host files from malicious compose artifacts. Update to v2.40.2, restrict sources, and audit caches.
Researchers have uncovered a new cybercriminal toolkit called MatrixPDF, designed to transform normal PDF files into weapons for phishing and malware delivery. This toolkit lowers the barrier for attackers. In fact, it provides ready made templates that let even inexperienced hackers craft PDF lures capable of bypassing security filters. As a result, phishing campaigns become…
Trump urged Microsoft to fire Lisa Monaco, its head of global affairs, raising concerns over her revoked security clearance and history in DOJ investigations.
API rate limiting protects capacity and user experience. This guide shows how to ship it correctly on NGINX: define limit_req zones, tune burst/nodelay, add per-IP and per-token limits, return proper 429s with Retry-After, and combine limit_conn for connection abuse. You’ll get production-ready snippets and a safe rollout plan.
Hackers posing as Medusa agents tried to lure BBC’s Joe Tidy into facilitating a cyberattack, offering him 15–25% of ransom payouts in exchange for his laptop’s access to the network.
A new Cl0p ransomware breach has hit dozens of organizations across finance, energy, and logistics sectors. Analysts warn the campaign marks a resurgence of the group’s dark-web leak operations, signaling a return to large-scale, supply-chain-style extortion attacks.
Agent session smuggling lets a hostile AI agent exploit a live multi-agent conversation, inherit tool authority, and trigger real actions. With scoped credentials, signed steps, and guarded workflows, teams can keep speed without losing control.
NGAV (next-gen antivirus) focuses on stopping malware and exploits with AI and behavior analysis. EDR adds continuous visibility, investigation, and one-click response when prevention misses. For most SMEs, start with a strong NGAV baseline and move to EDR as soon as you can support alerts and response especially if ransomware or hands-on-keyboard attacks worry you. …
Threat actors behind a coordinated network on YouTube have uploaded over 3,000 videos that masquerade as software tutorials and cheat walkthroughs, yet lead to credential‐stealer malware downloads. The operation uses compromised channels, fake engagement and download links to evade detection posing a new category of platform-based threat for security teams.
Pass-the-Hash succeeds when local admin passwords repeat and admins sign in everywhere. Small ADs can end that pattern fast. Use Windows LAPS to rotate a unique secret per device and enforce a Tier 0/1/2 admin model so privileged credentials never roam. Add Credential Guard and LSA Protection to shrink theft opportunities.