Firefox
24
Oct
2025

New Firefox extensions must disclose data collection practices

Starting next month, Mozilla will require Firefox extension developers to disclose whether their add-ons collect or share user data with…

ChatGPT Atlas Stores OAuth Tokens Unencrypted Leads to Unauthorized Access to User Accounts
24
Oct
2025

ChatGPT Atlas Stores OAuth Tokens Unencrypted Leads to Unauthorized Access to User Accounts

A significant vulnerability in OpenAI’s newly released ChatGPT Atlas browser reveals that it stores unencrypted OAuth tokens in a SQLite…

Cybersecurity at a Crossroads: Why AI-Driven Innovation Demands Organizational Accountability
24
Oct
2025

Cybersecurity at a Crossroads: Why AI-Driven Innovation Demands Organizational Accountability

Executives are facing a defining challenge with artificial intelligence (AI): how to responsibly harness its power while defending against the…

Telegram Messenger Abused by Android Malware to Seize Full Device Control
24
Oct
2025

Telegram Messenger Abused by Android Malware to Seize Full Device Control

Security researchers at Doctor Web have uncovered a sophisticated Android backdoor disguised as Telegram X that grants cybercriminals complete control…

Arsen Launches Smishing Simulation to Help Companies Defend Against Mobile Phishing Threats
24
Oct
2025

Arsen Launches Smishing Simulation to Help Companies Defend Against Mobile Phishing Threats

Paris, France, October 24th, 2025, CyberNewsWire Arsen, the cybersecurity company dedicated to helping organizations defend against social engineering, today introduced…

China helps North Korean operatives land IT roles, bypassing sanctions
24
Oct
2025

North Korea led the world in nation-state hacking in Q2 and Q3

Dive Brief: Hackers affiliated with the North Korean government accounted for a plurality of nation-state cyberattacks between April and September,…

New Fileless Remcos Attacks Bypassing EDRs Malicious Code into RMClient
24
Oct
2025

New Fileless Remcos Attacks Bypassing EDRs Malicious Code into RMClient

Remcos, a commercial remote access tool marketed as legitimate surveillance software, has become the leading infostealer in malware campaigns during…

Vault Viper Exploits Online Gambling Websites Using Custom Browser to Install Malicious Program
24
Oct
2025

Vault Viper Exploits Online Gambling Websites Using Custom Browser to Install Malicious Program

A major cybersecurity investigation has uncovered a sophisticated criminal operation called Vault Viper that exploits online gambling platforms to distribute…

Ethical Hacker Finds User Passwords In 180 Seconds
24
Oct
2025

Protecting And Managing Unstructured Data At Scale

“We’re facing what can feel like an impossible challenge: Cutting spend while unstructured data continues to grow, reducing risk from…

Why Executives and Practitioners See Risk Differently
24
Oct
2025

Why Executives and Practitioners See Risk Differently

Oct 24, 2025The Hacker NewsCyber Resilience / Data Protection Does your organization suffer from a cybersecurity perception gap? Findings from…

Drone, Malware, Drone Malware, North Korea, UAV, Operation DreamJob, Operation Dream Job
24
Oct
2025

North Korean Hackers Deploy “Drone” Malware In Targeting Of European UAV Manufacturers

The name said it all: DroneEXEHijackingLoader.dll. That internal file name, buried in malicious code delivered to three European defense contractors,…

Summoning Team won Master of Pwn as Pwn2Own Ireland Rewards $1,024,750
24
Oct
2025

Summoning Team won Master of Pwn as Pwn2Own Ireland Rewards $1,024,750

Summoning Team won Master of Pwn as Pwn2Own Ireland Rewards $1,024,750 Pierluigi Paganini October 24, 2025 The Pwn2Own Ireland hacking…