Security3 Min Read October 2, 2025 Red Hat confirms security incident after hackers breach GitLab instance Correction: After publishing, Red Hat confirmed that it was a breach of one of its GitLab instances, and not GitHub. Title and story updated.…
Encryption Hardware Security3 Min Read October 1, 2025 New WireTap Attack Extracts Intel SGX ECDSA Key via DDR4 Memory-Bus Interposer In yet another piece of research, academics from Georgia Institute of Technology and Purdue University have demonstrated that the security…
Data Breach Phishing Ransomware Vulnerabilities10 Min Read October 1, 2025 Cyber Brief 25-10 – September 2025 Cyber Brief (September 2025)October 1, 2025 - Version: 1TLP:CLEARExecutive summaryWe analysed 285 open source reports for this Cyber Security…
Malware Network Vulnerabilities Windows3 Min Read October 1, 2025 Backdoor Disguised as SOCKS5 Proxy: Malicious PyPI Package SoopSocks Grants Root Access The of the open-source software supply chain was once again tested when JFrog’s research team uncovered a malicious package on PyPI. The…
DDoS Linux Ransomware Vulnerabilities3 Min Read September 30, 2025 CISA Adds Five Actively Exploited Vulnerabilities to KEV Catalog The threat landscape continues to evolve rapidly and staying ahead of actively exploited vulnerabilities is key to effective cybersecurity…
Supply Chain Vulnerabilities3 Min Read September 30, 2025 Achieving Crypto Agility Through eFPGA: A Prerequisite for Secure ASIC and SoC Designs In an era where digital threats evolve daily and quantum computing looms on the horizon, the need for true crypto agility has never been more…
Supply Chain2 Min Read September 30, 2025 Asahi Suspends Operations in Japan After Cyber-Attack Brewing giant Asahi has suspended operations in Japan following a “system failure” caused by a cyber-attack. The firm, which is headquartered…
Artificial Intelligence Data Protection3 Min Read September 30, 2025 Evolving Enterprise Defense to Secure the Modern AI Supply Chain The world of enterprise technology is undergoing a dramatic shift. Gen-AI adoption is accelerating at an unprecedented pace, and SaaS vendors…
Security3 Min Read September 29, 2025 UK govt backs JLR with £1.5 billion loan guarantee after cyberattack The UK Government is providing Jaguar Land Rover (JLR) with a £1.5 billion loan guarantee to restore its supply chain after a…
ICS/OT Supply Chain2 Min Read September 29, 2025 National Cyber Authorities Launch OT Security Guidance National cybersecurity agencies from seven countries, including the Five Eyes nations, have released new operational technology (OT) security…
Cybersecurity Hacking News15 Min Read September 29, 2025 Weekly Recap: Cisco 0-Day, Record DDoS, LockBit 5.0, BMC Bugs, ShadowV2 Botnet & More Cybersecurity never stops—and neither do hackers. While you wrapped up last week, new attacks were already underway. From hidden…
Data Breach Ransomware Supply Chain2 Min Read September 29, 2025 Harrods Reveals Supply Chain Breach Impacting Online Customers Luxury London department store Harrods has revealed that some of its e-commerce customers have had their personal information stolen via a…
MCP Server Vulnerability2 Min Read September 29, 2025 First Malicious MCP Server Found Stealing Emails in Rogue Postmark-MCP Package Cybersecurity researchers have discovered what has been described as the first-ever instance of a Model Context Protocol (MCP) server spotted…
Exploits Malware Vulnerabilities Windows2 Min Read September 29, 2025 DLL Hijacking Flaw (CVE-2025-56383) Found in Notepad++, Allowing Arbitrary Code Execution, PoC Available A newly disclosed in Notepad++ v8.8.3 has been assigned CVE-2025-56383. The , rated CVSS 6.5, allows attackers to hijack Notepad++’s DLL…
Data Breach Malware Vulnerabilities Windows8 Min Read September 28, 2025 Prompt Injection and Model Poisoning: The New Plagues of AI Security You wake up. Your AI wakes up. Somewhere, a stranger types a sentence, and your AI listens. This is not science fiction. This is the…
Legal Software2 Min Read September 28, 2025 EU probes SAP over anti-competitive ERP support practices The European Comission is investigating potential anti-competitive practices in aftermarket services SAP provides for its on-premise ERP…
Data Breach ICS/OT Ransomware Supply Chain3 Min Read September 26, 2025 2025 Ransomware Trends: How Australia’s Wealth Makes It a Prime Target Australia’s strong economy and high per-capita wealth have made it a prime target for ransomware groups, with the country facing a…
Supply Chain2 Min Read September 26, 2025 JLR Begins Phased Restart of Operations After Cyber-Attack Jaguar Land Rover (JLR) has begun a phased restart of operations following the devastating cyber-attack which curtailed production activities…
AI-driven security Continuous Monitoring Critical Infrastructure Featured Offensive Security Ransomware Shinobi Security Supply Chain Varun Uppal Zero Trust3 Min Read September 25, 2025 When Airports Go Dark: What The Weekend’s Cyber-attacks Tell Us About Business Risk Varun Uppal, founder and CEO of Shinobi Security Over the weekend, airports across Europe were thrown into chaos after a cyber-attack on one…
AgentForce AI AI agents CRM Cybersecurity ForcedLeak Salesforce Security Vulnerability3 Min Read September 25, 2025 ForcedLeak Flaw in Salesforce Agentforce AI Agent Exposed CRM Data A vulnerability dubbed ForcedLeak was recently discovered in Salesforce Agentforce, an AI-driven system designed to handle complex business…
Cybersecurity Hacking News12 Min Read September 25, 2025 Threatsday Bulletin: Rootkit Patch, Federal Breach, OnePlus SMS Leak, TikTok Scandal & More Welcome to this week's Threatsday Bulletin—your Thursday check-in on the latest twists and turns in cybersecurity and hacking. The…
Mobile Security Ransomware Supply Chain2 Min Read September 25, 2025 Experts Warn of Global Breach Risk from Indian Suppliers Global supply chains could be at risk after a new report revealed a surprisingly high share of Indian vendors have suffered a third-party…
Ransomware Supply Chain2 Min Read September 25, 2025 NCA Arrest Man as HardBit Ransomware Blamed for Airport Outages British investigators have arrested a man in connection with a suspected ransomware attack which continues to cause flight delays across…
Malware Software Security2 Min Read September 25, 2025 Malicious Rust Crates Steal Solana and Ethereum Keys — 8,424 Downloads Confirmed Cybersecurity researchers have discovered two malicious Rust crates impersonating a legitimate library called fast_log to steal Solana and…
Linux Phishing Ransomware Vulnerabilities2 Min Read September 25, 2025 New Phishing Campaign Targets PyPI Maintainers with Fake Domain The Python Package Index (PyPI) is once again the target of a phishing campaign aimed at maintainers, with attackers using domain confusion…
Exploits Ransomware Supply Chain Vulnerabilities5 Min Read September 24, 2025 CVE-2025-23298: Getting Remote Code Execution in NVIDIA Merlin While investigating the security posture of various machine learning (ML) and artificial intelligence (AI) frameworks, the Trend Micro Zero…
Malware Ransomware Supply Chain2 Min Read September 24, 2025 npm Package Uses QR Code Steganography to Steal Credentials A malicious npm package named Fezbox has been found using an unusual technique to conceal harmful code. The package employs a QR code as part…
AI Security Vulnerability5 Min Read September 24, 2025 Two Critical Flaws Uncovered in Wondershare RepairIt Exposing User Data and AI Models Cybersecurity researchers have disclosed two security flaws in Wondershare RepairIt that exposed private user data and potentially exposed the…
Security2 Min Read September 24, 2025 PyPI urges users to reset credentials after new phishing attacks The Python Software Foundation has warned victims of a new wave of phishing attacks using a fake Python Package Index (PyPI) website to reset…
Payment Security Web Security5 Min Read September 24, 2025 iframe Security Exposed: The Blind Spot Fueling Payment Skimmer Attacks Think payment iframes are secure by design? Think again. Sophisticated attackers have quietly evolved malicious overlay techniques to exploit…
Cloud Security Malware Supply Chain Vulnerabilities2 Min Read September 23, 2025 Third time's the charm? SolarWinds (again) patches critical Web Help Desk RCE SolarWinds on Tuesday released a hotfix - again - for a critical, 9.8-severity flaw in its Web Help Desk IT ticketing software that could…
Data Security Vulnerability2 Min Read September 23, 2025 SolarWinds Releases Hotfix for Critical CVE-2025-26399 Remote Code Execution Flaw SolarWinds has released hot fixes to address a critical security flaw impacting its Web Help Desk software that, if successfully exploited,…
Security2 Min Read September 23, 2025 GitHub tightens npm security with mandatory 2FA, access tokens GitHub is introducing a set of defenses against supply-chain attacks on the platform that led to multiple large-scale incidents recently.…
Cloud Security DevOps Security4 Min Read September 23, 2025 Lean Teams, Higher Stakes: Why CISOs Must Rethink Incident Remediation Big companies are getting smaller, and their CEOs want everyone to know it. Wells Fargo has cut its workforce by 23% over five years, Bank of…
Malware Supply Chain Attack3 Min Read September 23, 2025 GitHub Mandates 2FA and Short-Lived Tokens to Strengthen npm Supply Chain Security GitHub on Monday announced that it will be changing its authentication and publishing options "in the near future" in response to a recent…
Phishing Ransomware Social Engineering Supply Chain2 Min Read September 23, 2025 Jaguar Land Rover Extends Production Pause Again The UK’s largest carmaker has announced a further delay to restarting production after suffering a major cyber-attack earlier this month.…
Botnets Malware Supply Chain Windows2 Min Read September 23, 2025 BlockBlasters: When a Steam Game Turns Into a Malware Delivery Vehicle What began as a promising indie platformer has turned into one of the most alarming cases of malware-laced games on Steam in 2025. According…
Malware Phishing Vulnerabilities Windows2 Min Read September 23, 2025 Beyond Trust: A New Campaign Is Using a Legitimate Tool to Deliver RATs A new report from Hunt Intelligence reveals how attackers are abusing ConnectWise ScreenConnect (formerly ConnectWise Control) to deliver…
Data Breach Phishing Ransomware Vulnerabilities24 Min Read September 22, 2025 Weekly Recap: Chrome 0-Day, AI Hacking Tools, DDR5 Bit-Flips, npm Worm & More The security landscape now moves at a pace no patch cycle can match. Attackers aren't waiting for quarterly updates or monthly…
Ransomware Supply Chain2 Min Read September 22, 2025 Airport Chaos Enters Third Day After Supply Chain Attack A suspected cyber-attack targeting a third-party software supplier has caused major flight cancellations and delays at several European…
Malware Phishing Ransomware Vulnerabilities7 Min Read September 21, 2025 Week in review: Chrome 0-day fixed, npm supply chain attack, LinkedIn data used for AI Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Most enterprise AI use is…
Apple Supply Chain2 Min Read September 19, 2025 The iPhone Fold is Coming: Apple’s 2026 Strategy Revealed According to a report by Nikkei Asia, Apple has recently informed its supply chain partners that shipments of the iPhone 18 series, slated for…