The Cloud CommunityThe Cloud Community
    Join Our Community
  • Cloud Clinics
  • Resource Centre
  • Technologies
      • Modern Cloud Platforms
      • Cloud assessment
      • Platform as a service
      • Managed Services
      • Technologies
      • IT transformation
      • Advanced Cloud Solutions
      • Advanced Workloads
      • Storage Optimisation
      • The business case for cloud
      • Connected Workplace
      • eSignatures
      • Call management
      • File Sharing
      • Storage
      • Collaboration Tools and Remote Workplace
      • Remote Working
      • DocuSign
      • Backup and security
      • Cloud Telephony
      • Call Recording
      • Direct Routing
      • Meeting Rooms
      • Call Centre
      • Seamless Security
      • Vulnerability Management
      • Network security
      • Identity and access management
      • Data protection
      • Mobile security
      • Hardware security
      • Cloud Security
      • Security Frameworks
      • Antivirus
      • Endpoint Protection
      • Remote Monitoring
      • Disaster Recovery
      • Password Protection
      • Business Performance
      • Customer Relationship Management
      • Cloud Management
      • Enterprise Resource Planning
      • Low code solutions
      • Shop B2B
      • Power Platform
      • AI and Copilot
      • Business Performance
      • Sustainability
  • In the News
  • Events

In The News

  • Home
  • In The News

⚡ Weekly Recap — SharePoint Breach, Spyware, IoT Hijacks, DPRK Fraud, Crypto Drains and More


Mon, 28 Jul 2025 17:43:00 +0530

Email Security Is Stuck in the Antivirus Era: Why It Needs a Modern Approach


Mon, 28 Jul 2025 16:55:00 +0530

Scattered Spider Hijacks VMware ESXi to Deploy Ransomware on Critical U.S. Infrastructure


Mon, 28 Jul 2025 11:49:00 +0530

Critical Flaws in Niagara Framework Threaten Smart Buildings and Industrial Systems Worldwide


Mon, 28 Jul 2025 09:42:00 +0530

U.S. Sanctions Firm Behind N. Korean IT Scheme; Arizona Woman Jailed for Running Laptop Farm


Fri, 25 Jul 2025 20:35:00 +0530

Patchwork Targets Turkish Defense Firms with Spear-Phishing Using Malicious LNK Files


Fri, 25 Jul 2025 19:45:00 +0530

Cyber Espionage Campaign Hits Russian Aerospace Sector Using EAGLET Backdoor


Fri, 25 Jul 2025 18:44:00 +0530

Soco404 and Koske Malware Target Cloud Services with Cross-Platform Cryptomining Attacks


Fri, 25 Jul 2025 16:03:00 +0530

Overcoming Risks from Chinese GenAI Tool Usage


Fri, 25 Jul 2025 15:55:00 +0530

Critical Mitel Flaw Lets Hackers Bypass Login, Gain Full Access to MiVoice MX-ONE Systems


Thu, 24 Jul 2025 22:44:00 +0530

Fire Ant Exploits VMware Flaws to Compromise ESXi Hosts and vCenter Environments


Thu, 24 Jul 2025 22:35:00 +0530

CastleLoader Malware Infects 469 Devices Using Fake GitHub Repos and ClickFix Phishing


Thu, 24 Jul 2025 20:43:00 +0530

Sophos and SonicWall Patch Critical RCE Flaws Affecting Firewalls and SMA 100 Devices


Thu, 24 Jul 2025 19:44:00 +0530

Watch This Webinar to Uncover Hidden Flaws in Login, AI, and Digital Trust — and Fix Them


Thu, 24 Jul 2025 17:06:00 +0530

Pentests once a year? Nope. It’s time to build an offensive SOC


Thu, 24 Jul 2025 16:30:00 +0530

China-Based APTs Deploy Fake Dalai Lama Apps to Spy on Tibetan Community


Thu, 24 Jul 2025 16:29:00 +0530

Storm-2603 Exploits SharePoint Flaws to Deploy Warlock Ransomware on Unpatched Systems


Thu, 24 Jul 2025 16:07:00 +0530

Europol Arrests XSS Forum Admin in Kyiv After 12-Year Run Operating Cybercrime Marketplace


Thu, 24 Jul 2025 12:18:00 +0530

Hackers Deploy Stealth Backdoor in WordPress Mu-Plugins to Maintain Admin Access


Thu, 24 Jul 2025 10:41:00 +0530

Threat Actor Mimo Targets Magento and Docker to Deploy Crypto Miners and Proxyware


Wed, 23 Jul 2025 22:45:00 +0530

New Coyote Malware Variant Exploits Windows UI Automation to Steal Banking Credentials


Wed, 23 Jul 2025 18:28:00 +0530

Kerberoasting Detections: A New Approach to a Decade-Old Challenge


Wed, 23 Jul 2025 16:30:00 +0530

Google Launches OSS Rebuild to Expose Malicious Code in Widely Used Open-Source Packages


Wed, 23 Jul 2025 14:58:00 +0530

CISA Orders Urgent Patching After Chinese Hackers Exploit SharePoint Flaws in Live Attacks


Wed, 23 Jul 2025 11:54:00 +0530

Share this story

Related Articles
The big terms and what they mean to your business

Industry 4.0, the Fourth Industrial Revolution, and 4IR.

LEARN MORE
Cloud assessment

Enhancing Cloud Readiness and Performance

LEARN MORE
Platform as a service

LEARN MORE
Managed Services

LEARN MORE
Technologies

LEARN MORE
Protecting modern cloud workloads

The key features and benefits of Endpoint Detection and Response (EDR).

LEARN MORE
Next ’23 - Google's global exhibition of inspiration, innovation, and education

Google's global exhibition of inspiration, innovation, and education

LEARN MORE
Microsoft Envision The Tour​ London UK

ExCeL | October 18, 2023

LEARN MORE
IT transformation

LEARN MORE
Advanced Cloud Solutions

The benefits of cloud – without the downsides

LEARN MORE
Advanced Workloads

Managing increasingly high demands on IT resource

LEARN MORE
Cloud Maker

Cloud Maker

LEARN MORE
CloudCheckr

CloudCheckr

LEARN MORE
Nerdio

Nerdio

LEARN MORE
AWS Automated Templates

Cheaper, quicker, easier deployment

LEARN MORE
Storage Optimisation

LEARN MORE
The business case for cloud

LEARN MORE
Get ready for AWS Summit London 2024

Explore how cutting-edge technologies empower business at the AWS Summit.

LEARN MORE
Cloud Computing Trends for SMBs

Leverage trends, strategies, and predictions to give your business a competitive edge.

LEARN MORE
Unlock Next-level Performance Scale from VMs to Kubernetes

How to scale from VMs to Kubernetes.

LEARN MORE
User Rating
Rate the Article

Click the link below to rate this article

Rate this article
Have you seen...

Get all of the Azure migration tools and guidance you need to plan and implement your move to the cloud – and track your progress using a central dashboard that provides intelligent insights.

Watch Video
Related Articles
Rate this article

Let us know what you think about the article.

Choose what you want to see

Let us know what you’re interested in and the issues that matter to you.

If you’d like to know more about any of the technologies mentioned in this article please get in touch.
© 2025 The Cloud Community | Privacy Policy | Terms & Conditions