UK ramps up ransomware fightback with supply chain security guide
24
Oct
2025

UK ramps up ransomware fightback with supply chain security guide

The UK government has released new anti-ransomware guidance designed to address the weaknesses in supply chains that have been the…

ransomware attacks September 2025
24
Oct
2025

Ransomware Attacks Have Soared This Year

Ransomware attacks have soared 50% in 2025 despite major changes among the leading ransomware groups, according to a new Cyble…

Financial services tech leaders tackle agentic AI governance
24
Oct
2025

Financial services tech leaders tackle agentic AI governance

The proliferation of autonomous systems and tools is changing the risk management landscape for financial services companies, according to technology…

SideWinder Hacking Group Uses ClickOnce-Based Infection Chain to Deploy StealerBot Malware
24
Oct
2025

SideWinder Hacking Group Uses ClickOnce-Based Infection Chain to Deploy StealerBot Malware

The SideWinder advanced persistent threat group has emerged with a sophisticated new attack methodology that leverages ClickOnce applications to deploy…

New RedTiger Tool Targets Gamers and Discord Accounts in the Wild
24
Oct
2025

New RedTiger Tool Targets Gamers and Discord Accounts in the Wild

Gamers face a growing threat from cybercriminals exploiting popular gaming and communication platforms. A dangerous infostealer called RedTiger is now…

Critical WSUS Vulnerability
24
Oct
2025

Newly Patched Critical Microsoft WSUS Flaw Comes Under Active Exploitation

Oct 24, 2025Ravie LakshmananVulnerability / Network Security Microsoft on Thursday released out-of-band security updates to patch a critical-severity Windows Server…

SentinelOne analysis links service disruption to software flaw
24
Oct
2025

Researchers warn of critical flaws in TP-Link routers

Critical flaws in TP-Link Omada and Festa VPN routers could allow attackers to take control of a device, according to…

New National Cyber Director Cairncross faces challenges on policy, bureaucracy, threats
24
Oct
2025

National cyber director says U.S. needs to counter Chinese surveillance, push American tech

The United States needs to counter China’s “attempt to export a surveillance state across planet Earth,” and instead push a…

Scammers use fake courier messages to steal Hong Kong bank details from victims
24
Oct
2025

Scammers use fake courier messages to steal Hong Kong bank details from victims

Two people have fallen victim to scammers who impersonated courier workers and sent fake text messages to steal bank account…

Windows Server
24
Oct
2025

Critical WSUS flaw in Windows Server now exploited in attacks

Attackers are now exploiting a critical-severity Windows Server Update Service (WSUS) vulnerability, which already has publicly available proof-of-concept exploit code….

WhatsApp Exploit Privately Disclosed To Meta At The Pwn2Own Ireland
24
Oct
2025

WhatsApp Exploit Privately Disclosed To Meta At The Pwn2Own Ireland

At Pwn2Own Ireland 2025 hacking competition, cybersecurity researchers from Team Z3 have withdrawn their high-stakes demonstration of a potential zero-click…

Google Warns of Cybercriminals Using Fake Job Postings to Spread Malware and Steal Credentials
24
Oct
2025

Google Warns of Cybercriminals Using Fake Job Postings to Spread Malware and Steal Credentials

Google’s Threat Intelligence Group (GTIG) has uncovered a sophisticated social engineering campaign orchestrated by financially motivated threat actors based in…