My Courses
-

Deficiencies in the dealership systems of a leading automotive manufacturer facilitated car hacking and the theft of personal information.
A researcher has revealed significant vulnerabilities in a platform utilised by over 1,000 dealerships across the United States, highlighting how these flaws could have been…
-

Russian hackers took advantage of a WinRAR zero-day vulnerability to launch attacks in Europe and Canada.
WinRAR has addressed the critical vulnerability identified as CVE-2025-8088, a zero-day flaw that was actively exploited by the Russian hacking group RomCom. This vulnerability posed…
-

RomCom hackers are utilizing a zero-day vulnerability in WinRAR to conduct specific targeted attacks.
ESET researchers have identified a previously unknown vulnerability in WinRAR, which has been exploited in the wild by the Russia-aligned group RomCom. Users of WinRAR…
-

Despite increases in breaches and budgets, the safety of healthcare systems has not improved.
A new report from Resilience highlights a growing cyber crisis in the U.S. healthcare sector, where ransomware attacks, vendor compromises, and human error are causing…
-

Penetration testing has become a fundamental component of the strategy for Chief Information Security Officers (CISOs).
Security leaders are re-evaluating their cybersecurity strategies as digital supply chains grow and Generative AI becomes integral to critical systems. A recent survey by Emerald…
-

Researchers have outlined a Windows EPM poisoning exploit sequence that can result in escalated privileges within a domain.
Cybersecurity researchers have unveiled critical findings regarding a now-patched security vulnerability in Microsoft’s Windows Remote Procedure Call (RPC) communication protocol. This vulnerability, tracked as CVE-2025-49760…
-

Scientists have discovered vulnerabilities in GPT-5 that allow for jailbreaks and zero-click AI agent attacks, which threaten the security of cloud and IoT systems.
Cybersecurity researchers have discovered a jailbreak technique that circumvents the ethical guardrails implemented by OpenAI in its latest large language model, GPT-5, enabling the generation…
-

A vulnerability in Lenovo webcams that run on Linux can be exploited remotely, allowing for potential BadUSB attacks.
Cybersecurity researchers have identified vulnerabilities in specific Lenovo webcam models that could enable them to function as BadUSB attack devices. This discovery allows remote attackers…



