Volkswagen Allegedly Hacked in Ransomware Attack as 8Base Claims Data Leak
Volkswagen Group is investigating claims from the 8Base ransomware group, which asserts it has stolen sensitive company data. While the German automaker has stated that…
Volkswagen Group is investigating claims from the 8Base ransomware group, which asserts it has stolen sensitive company data. While the German automaker has stated that…
Transport for NSW is looking to test advanced autonomous assistance features on buses, with the state transport authority investigating both new buses and retrofitted solutions…
Microsoft’s latest cumulative update for Windows 11, KB5066835, is causing significant disruptions for users, most notably by rendering USB keyboards and mice useless within the…
Retailer David Jones is in the “ideation phase” of deploying an artificial intelligence super-agent that could underpin its business modernisation and digital transformation projects for…
Experian Netherlands has been fined EUR 2.7 million ($3.2 million) for multiple violations of the General Data Protection Regulation (GDPR) The Dutch Data Protection Authority (AP)…
Andrej Karpathy came on Dwarkesh’s podcast recently, and I have a number of thoughts. Many are saying that Karpathy thinks AGI is 10 years away,…
Cybercriminals are using TikTok videos disguised as free activation guides for popular software like Windows, Spotify, and Netflix to spread information-stealing malware. ISC Handler Xavier…
Security Affairs newsletter Round 546 by Pierluigi Paganini – INTERNATIONAL EDITION Pierluigi Paganini October 19, 2025 A new round of the weekly Security Affairs newsletter…
Cybersecurity has made remarkable strides over the past decade. We have seen the rise of AI-driven threat detection, cloud-native architecture, and real-time analytics. But amid…
Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape Malware Newsletter Astaroth: Banking Trojan Abusing…
For years, vishing (voice phishing) was the clumsy cousin of cybercrime, relying on crude robocalls and easily detectable scripts. That era is over. What was…
A high-severity vulnerability in the Pluggable Authentication Modules (PAM) framework was assigned the identifier CVE-2025-8941. This vulnerability stems from the heart of Linux operating systems,…