Ingram Micro restores global operations following hack
08
Aug
2025

Financially motivated cluster a key player in ToolShell exploitation

A financially motivated threat actor has been involved in a cluster of activity linked to the ToolShell vulnerability in Microsoft…

Microsoft’s software licensing playbook is a national security risk
08
Aug
2025

Microsoft: An organization without a response plan will be hit harder by a security incident

LAS VEGAS — Businesses that don’t treat security with the gravity it requires — exhibited by lackluster or nonexistent preparation,…

Gavel
08
Aug
2025

U.S. Judiciary confirms breach of court electronic records service

The U.S. Federal Judiciary confirms that it suffered a cyberattack on its electronic case management systems hosting confidential court documents…

PyPI Issues Advisory to Prevent ZIP Parser Confusion Attacks on Python Package Installers
08
Aug
2025

PyPI Issues Advisory to Prevent ZIP Parser Confusion Attacks on Python Package Installers

The Python Package Index (PyPI) has announced new restrictions aimed at mitigating ZIP parser confusion attacks that could exploit discrepancies…

Research reveals possible privacy gaps in Apple Intelligence’s data handling
08
Aug
2025

Research reveals possible privacy gaps in Apple Intelligence’s data handling

LAS VEGAS — One of the big worries during the generative AI boom is where exactly data is traveling when…

Are You Sending the Wrong Signals?
08
Aug
2025

Are You Sending the Wrong Signals?

The Salt team has spent the last 5-10 years producing blogs, comparison documents and webinars which highlight our credentials versus…

Windows UAC Bypass Exploits Character Map Tool for Privilege Escalation
08
Aug
2025

Windows UAC Bypass Exploits Character Map Tool for Privilege Escalation

Cybersecurity researchers have uncovered a new technique that allows attackers to bypass Windows User Account Control (UAC) protections by exploiting…

Multiple Security vulnerabilities Found in WWBN AVideo, MedDream, and Eclipse ThreadX
08
Aug
2025

Multiple Security vulnerabilities Found in WWBN AVideo, MedDream, and Eclipse ThreadX

Cisco Talos’ Vulnerability Discovery & Research team has disclosed a total of 12 critical security vulnerabilities across three popular software…

Optus Data Breach, Optus Cyberattack, Optus Cyber Attack, Optus Data Leak
08
Aug
2025

Australian Information Commissioner Seeks Civil Penalty Action Over 2022 Optus Data Breach

The Australian Information Commissioner has launched civil penalty proceedings against telecommunications giant Optus over the massive 2022 data breach that…

What’s New With the Next-Generation AI Agent
08
Aug
2025

What’s New With the Next-Generation AI Agent

OpenAI has officially launched ChatGPT-5, a new generation of its AI agent that introduces a sophisticated, unified system designed to…

It Looks Like a School Bathroom Smoke Detector. A Teen Hacker Showed It Could Be an Audio Bug
08
Aug
2025

It Looks Like a School Bathroom Smoke Detector. A Teen Hacker Showed It Could Be an Audio Bug

To hack the Halo 3C, they found that if they could connect to one over the network it was installed…

VexTrio TDS Deploys Malicious VPN Apps on Google Play and App Store
08
Aug
2025

VexTrio TDS Deploys Malicious VPN Apps on Google Play and App Store

VexTrio, a sophisticated threat actor known for operating a massive traffic distribution system (TDS), has expanded its malicious activities by…