Critical Security Flaws In Workflow Automation Tool Put Pakistani Businesses At Risk
CERT warns of critical vulnerabilities in a widely used workflow automation tool that could allow hackers to take control of business systems in Pakistan.
CERT warns of critical vulnerabilities in a widely used workflow automation tool that could allow hackers to take control of business systems in Pakistan.
RondoDox botnet leverages critical React2Shell vulnerability in Next.js and React Server Components to compromise IoT devices and web servers, deploy cryptocurrency miners, and establish persistent control.
A surge in global cyber threat activity highlights ransomware collaboration, botnet driven attacks, browser flaws, cloud data theft, and critical vulnerabilities across devices and platforms.
Wiz researchers warn of active exploitation of a high-severity Gogs flaw CVE-2025-8110, affecting over 700 instances. Attackers leverage symbolic link bypass and GitHub PATs to gain code execution and cloud access.
Researchers reveal phishing attacks abusing Google Cloud’s email feature to steal Microsoft 365 credentials, using multi-stage redirection and trusted cloud infrastructure to evade detection.
Sangfor participates in Network & Security Summit Faisalabad 2025, sharing insights on cloud and security solutions to strengthen enterprise IT infrastructure.
NIC Karachi signs MoU with YOTTABYTE to provide advanced cybersecurity training, mentorship, and skill-building programs for startups, students, and professionals in Pakistan.
U.S. CISA issues alert on BRICKSTORM, a Golang-based backdoor targeting VMware vSphere and Windows systems, used by China-linked groups for persistent network access and data exfiltration.
Risk Associates has awarded PCI DSS v4.0.1 Compliance Certification to Garaj, Jazz’s enterprise cloud and cybersecurity platform, marking a key milestone in secure digital infrastructure in Pakistan.
JBS Global, in collaboration with Microsoft, hosted an in-depth session for IT and security leaders on leveraging Microsoft’s unified security stack to detect and respond to cyber threats, emphasizing proactive defense strategies for modern enterprises.