Category: Featured
Cybersecurity Threat Advisory: Zero-day Chrome vulnerability
Google has patched a high-severity zero-day vulnerability, tracked as CVE-2025-6554 with a CVSS score of 8.1, in Chrome’s V8 engine that allows attackers to execute arbitrary code via a crafted HTML page. Review the details of this Cybersecurity Threat Advisory...
Should you be worried about copyr(AI)ght?
In previous articles, I’ve covered much of the good and evil around artificial intelligence (AI). An area that I haven’t covered is the impact of copyright on the use of AI. UK and EU tackle AI copyright In the UK,...
Cybersecurity Threat Advisory: Severe WebDAV vulnerability
Microsoft has disclosed a serious zero-day vulnerability in the Web Distributed Authoring and Versioning (WebDAV) protocol, identified as CVE-2025-33053, with a CVSS score of 8.8. Actively exploited by the Stealth Falcon APT group, this vulnerability enables remote code execution (RCE)...
Cybersecurity Threat Advisory: Citrix Gateway vulnerability
Citrix has issued emergency patches for a critical memory overflow flaw that impacts NetScaler ADC and Gateway. Exploitation can lead to denial-of-service (DoS) and system control issues. Review this Cybersecurity Threat Advisory for guidance on protecting your systems against this...
Building client trust: Strategies to prove security and compliance
Client trust is one of the most valuable assets a managed service provider (MSP) can earn. As clients become more informed about cybersecurity and more cautious in choosing their providers, it’s no longer enough to say you’re secured – you...
Unmasking the next wave: LLMs and evolving cyberthreats
This week, we bring you additional interviews with experts on the cybersecurity dangers posed by large language models (LLMs) such as Claude, DeepSeek, and ChatGPT. With the rapid rise in the use of these services comes an increasing set of...
Cybersecurity Threat Advisory: Vulnerabilities in Linux distributions
Two critical local privilege escalation (LPE) vulnerabilities were disclosed, identified as CVE-2025-6018 and CVE-2025-6019. These vulnerabilities affect all versions of SUSE 15 and libblockdev, two major Linux distributions, allowing unprivileged users to escalate their privileges to root and posing significant...
Tech Time Warp: The secrets to the Apple II’s success
The Apple II, designed by Steve Wozniak in 1977, was a groundbreaking self-contained machine, with screen, keyboard, power supply, and electronics all in a single plastic unit. The first Apple IIs were shipped on June 10, 1977, and cost $1,298....
