Supply Chain2 Min Read September 26, 2025 JLR Begins Phased Restart of Operations After Cyber-Attack Jaguar Land Rover (JLR) has begun a phased restart of operations following the devastating cyber-attack which curtailed production activities…
AI-driven security Continuous Monitoring Critical Infrastructure Featured Offensive Security Ransomware Shinobi Security Supply Chain Varun Uppal Zero Trust3 Min Read September 25, 2025 When Airports Go Dark: What The Weekend’s Cyber-attacks Tell Us About Business Risk Varun Uppal, founder and CEO of Shinobi Security Over the weekend, airports across Europe were thrown into chaos after a cyber-attack on one…
Cybersecurity Hacking News12 Min Read September 25, 2025 Threatsday Bulletin: Rootkit Patch, Federal Breach, OnePlus SMS Leak, TikTok Scandal & More Welcome to this week's Threatsday Bulletin—your Thursday check-in on the latest twists and turns in cybersecurity and hacking. The…
Mobile Security Ransomware Supply Chain2 Min Read September 25, 2025 Experts Warn of Global Breach Risk from Indian Suppliers Global supply chains could be at risk after a new report revealed a surprisingly high share of Indian vendors have suffered a third-party…
Ransomware Supply Chain2 Min Read September 25, 2025 NCA Arrest Man as HardBit Ransomware Blamed for Airport Outages British investigators have arrested a man in connection with a suspected ransomware attack which continues to cause flight delays across…
Malware Software Security2 Min Read September 25, 2025 Malicious Rust Crates Steal Solana and Ethereum Keys — 8,424 Downloads Confirmed Cybersecurity researchers have discovered two malicious Rust crates impersonating a legitimate library called fast_log to steal Solana and…
Linux Phishing Ransomware Vulnerabilities2 Min Read September 25, 2025 New Phishing Campaign Targets PyPI Maintainers with Fake Domain The Python Package Index (PyPI) is once again the target of a phishing campaign aimed at maintainers, with attackers using domain confusion…
Exploits Ransomware Supply Chain Vulnerabilities5 Min Read September 24, 2025 CVE-2025-23298: Getting Remote Code Execution in NVIDIA Merlin While investigating the security posture of various machine learning (ML) and artificial intelligence (AI) frameworks, the Trend Micro Zero…
Malware Ransomware Supply Chain2 Min Read September 24, 2025 npm Package Uses QR Code Steganography to Steal Credentials A malicious npm package named Fezbox has been found using an unusual technique to conceal harmful code. The package employs a QR code as part…
AI Security Vulnerability5 Min Read September 24, 2025 Two Critical Flaws Uncovered in Wondershare RepairIt Exposing User Data and AI Models Cybersecurity researchers have disclosed two security flaws in Wondershare RepairIt that exposed private user data and potentially exposed the…
Security2 Min Read September 24, 2025 PyPI urges users to reset credentials after new phishing attacks The Python Software Foundation has warned victims of a new wave of phishing attacks using a fake Python Package Index (PyPI) website to reset…
Payment Security Web Security5 Min Read September 24, 2025 iframe Security Exposed: The Blind Spot Fueling Payment Skimmer Attacks Think payment iframes are secure by design? Think again. Sophisticated attackers have quietly evolved malicious overlay techniques to exploit…
Cloud Security Malware Supply Chain Vulnerabilities2 Min Read September 23, 2025 Third time's the charm? SolarWinds (again) patches critical Web Help Desk RCE SolarWinds on Tuesday released a hotfix - again - for a critical, 9.8-severity flaw in its Web Help Desk IT ticketing software that could…
Data Security Vulnerability2 Min Read September 23, 2025 SolarWinds Releases Hotfix for Critical CVE-2025-26399 Remote Code Execution Flaw SolarWinds has released hot fixes to address a critical security flaw impacting its Web Help Desk software that, if successfully exploited,…
Security2 Min Read September 23, 2025 GitHub tightens npm security with mandatory 2FA, access tokens GitHub is introducing a set of defenses against supply-chain attacks on the platform that led to multiple large-scale incidents recently.…
Cloud Security DevOps Security4 Min Read September 23, 2025 Lean Teams, Higher Stakes: Why CISOs Must Rethink Incident Remediation Big companies are getting smaller, and their CEOs want everyone to know it. Wells Fargo has cut its workforce by 23% over five years, Bank of…
Malware Supply Chain Attack3 Min Read September 23, 2025 GitHub Mandates 2FA and Short-Lived Tokens to Strengthen npm Supply Chain Security GitHub on Monday announced that it will be changing its authentication and publishing options "in the near future" in response to a recent…
Phishing Ransomware Social Engineering Supply Chain2 Min Read September 23, 2025 Jaguar Land Rover Extends Production Pause Again The UK’s largest carmaker has announced a further delay to restarting production after suffering a major cyber-attack earlier this month.…
Botnets Malware Supply Chain Windows2 Min Read September 23, 2025 BlockBlasters: When a Steam Game Turns Into a Malware Delivery Vehicle What began as a promising indie platformer has turned into one of the most alarming cases of malware-laced games on Steam in 2025. According…
Malware Phishing Vulnerabilities Windows2 Min Read September 23, 2025 Beyond Trust: A New Campaign Is Using a Legitimate Tool to Deliver RATs A new report from Hunt Intelligence reveals how attackers are abusing ConnectWise ScreenConnect (formerly ConnectWise Control) to deliver…
Data Breach Phishing Ransomware Vulnerabilities24 Min Read September 22, 2025 Weekly Recap: Chrome 0-Day, AI Hacking Tools, DDR5 Bit-Flips, npm Worm & More The security landscape now moves at a pace no patch cycle can match. Attackers aren't waiting for quarterly updates or monthly…
Ransomware Supply Chain2 Min Read September 22, 2025 Airport Chaos Enters Third Day After Supply Chain Attack A suspected cyber-attack targeting a third-party software supplier has caused major flight cancellations and delays at several European…
Malware Phishing Ransomware Vulnerabilities7 Min Read September 21, 2025 Week in review: Chrome 0-day fixed, npm supply chain attack, LinkedIn data used for AI Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Most enterprise AI use is…
Apple Supply Chain2 Min Read September 19, 2025 The iPhone Fold is Coming: Apple’s 2026 Strategy Revealed According to a report by Nikkei Asia, Apple has recently informed its supply chain partners that shipments of the iPhone 18 series, slated for…
Cloud Security Network Ransomware Supply Chain4 Min Read September 18, 2025 Why Outdated Corporate Networks Are Analogous to the Aging U.S. Highway System “Necessity is the mother of invention” has never been more fitting—whether you’re talking about America’s…
Security2 Min Read September 18, 2025 PyPI invalidates tokens stolen in GhostAction supply chain attack The Python Software Foundation team has invalidated all PyPI tokens stolen in the GhostAction supply chain attack in early September,…
Malware Supply Chain Attack2 Min Read September 18, 2025 SilentSync RAT Delivered via Two Malicious PyPI Packages Targeting Python Developers Cybersecurity researchers have discovered two new malicious packages in the Python Package Index (PyPI) repository that are designed to…
Cloud Security Data Breach Network Ransomware2 Min Read September 18, 2025 SolarWinds Issues Advisory on Salesforce Data Breach Linked to Salesloft Drift SolarWinds has issued a security advisory regarding a major Salesforce data breach that exposed sensitive information from numerous companies…
Cloud Security Malware Ransomware Supply Chain0 Min Read September 17, 2025 Shai-Hulud Worm Prowls npm to Steal Hundreds of Secrets For the third time in just a few weeks, experts are warning of a significant threat to the open source npm ecosystem, after discovering a…
Security4 Min Read September 16, 2025 Self-propagating supply chain attack hits 187 npm packages Security researchers have identified at least 187 npm packages compromised in an ongoing supply chain attack, with a malicious…
Exploits ICS/OT Malware Ransomware8 Min Read September 16, 2025 Digital Transformation Failures: A National Security Crisis in the Making In the hyperconnected world, digital transformation has become synonymous with progress, efficiency and innovation. For governments, business…
Ransomware Supply Chain0 Min Read September 16, 2025 JLR Extends Production Halt After Cyber-Attack Jaguar Land Rover (JLR) has confirmed it will extend its production pause until at least September 24 following a cyber-attack earlier this…
Cyber Attack Malware2 Min Read September 16, 2025 40 npm Packages Compromised in Supply Chain Attack Using bundle.js to Steal Credentials Cybersecurity researchers have flagged a fresh software supply chain attack targeting the npm registry that has affected more than 40 packages…
Ransomware Supply Chain4 Min Read September 15, 2025 Preparing for the EU’s DORA amidst Technical Controls Ambiguity The financial sector is bracing for a significant shift in its digital landscape as the EU’s Digital Operational Resilience Act (DORA)…
Cybersecurity Hacking News24 Min Read September 15, 2025 ⚡ Weekly Recap: Bootkit Malware, AI-Powered Attacks, Supply Chain Breaches, Zero-Days & More In a world where threats are persistent, the modern CISO's real job isn't just to secure technology—it's to preserve institutional trust…
Exploits ICS/OT Vulnerabilities Windows2 Min Read September 13, 2025 CISA Warns of Attacks on DELMIA Manufacturing Software Vulnerability The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a manufacturing operations management software vulnerability to its…
AI Security Vulnerability4 Min Read September 12, 2025 Cursor AI Code Editor Flaw Enables Silent Code Execution via Malicious Repositories A security weakness has been disclosed in the artificial intelligence (AI)-powered code editor Cursor that could trigger code execution when a…
Malware Phishing Ransomware Windows3 Min Read September 11, 2025 12 Ways to Protect Your Business from Hackers During Remote Work Michelle MooreUniversity of San Diego’sSeptember 11, 2025 Remote work is here to stay, with nearly a quarter of the U.S. workforce (22%)…
Identity & Access Phishing Ransomware Supply Chain2 Min Read September 11, 2025 LNER Reveals Supply Chain Attack Compromised Customer Information The operator of one of the UK’s busiest rail lines has admitted that an unauthorized third party has accessed customer details via a supplier.…
Cryptocurrency Security2 Min Read September 10, 2025 Hackers left empty-handed after massive NPM supply-chain attack The largest supply-chain compromise in the history of the NPM ecosystem has impacted roughly 10% of all cloud environments, but…
Artificial Intelligence Security2 Min Read September 10, 2025 Cursor AI editor lets repos “autorun” malicious code on devices A weakness in the Cursor code editor exposes developers to the risk of automatically executing tasks in a malicious repository as soon as…
Cloud Security Data Breach Ransomware2 Min Read September 10, 2025 KillSec Ransomware Hits Brazilian Healthcare IT Vendor A ransomware attack claimed by the group KillSec has disrupted MedicSolution, a software provider serving Brazil’s healthcare sector. On…