Is agentic AI the beginning of the end for ERP?
27
Oct
2025

Is agentic AI the beginning of the end for ERP?

Predictions of enterprise resource planning’s (ERP’s) demise are not new. Client-server was supposed to kill the mainframe, cloud was meant…

Hackers Leveraging ClickFix Technique to Deploy NetSupport RAT Loaders
27
Oct
2025

Hackers Leveraging ClickFix Technique to Deploy NetSupport RAT Loaders

Cybercriminals continue to evolve their tactics for compromising systems, with recent campaigns demonstrating a significant shift from traditional fake update…

X (Twitter) Requires Security Key Users to Re-Enroll Ahead of Domain Migration
27
Oct
2025

X to Retire Twitter.com, Users Must Re-Register Security Keys by Nov 10 – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More

X (formerly Twitter) has announced that users who rely on security keys for two-factor authentication (2FA) must re-enroll their keys…

Linux variant of Qilin Ransomware targets Windows via remote management tools and BYOVD
27
Oct
2025

Linux variant of Qilin Ransomware targets Windows via remote management tools and BYOVD

Linux variant of Qilin Ransomware targets Windows via remote management tools and BYOVD Pierluigi Paganini October 27, 2025 Qilin ransomware…

Chrome 0-Day Vulnerability Actively Exploited in Attacks by Notorious Hacker Group
27
Oct
2025

Chrome 0-Day Vulnerability Actively Exploited in Attacks by Notorious Hacker Group

The notorious Mem3nt0 mori hacker group has been actively exploiting a zero-day vulnerability in Google Chrome, compromising high-profile targets across…

Hundreds of People With ‘Top Secret’ Clearance Exposed by House Democrats’ Website
27
Oct
2025

Hundreds of People With ‘Top Secret’ Clearance Exposed by House Democrats’ Website

The sensitive personal details of more than 450 people holding “top secret” US government security clearances were left exposed online,…

Coordinated Cyberattacks Seek to Cripple Critical Infrastructure
27
Oct
2025

Coordinated Cyberattacks Seek to Cripple Critical Infrastructure

A sophisticated cyber-sabotage group known as Predatory Sparrow has emerged as one of the most destructive threat actors targeting Iranian…

Qilin Ransomware
27
Oct
2025

Qilin Ransomware Combines Linux Payload With BYOVD Exploit in Hybrid Attack

The ransomware group known as Qilin (aka Agenda, Gold Feather, and Water Galura) has claimed more than 40 victims every…

HashiCorp Vault Vulnerabilities Let Attack Bypass Authentication And Trigger DoS Attack
27
Oct
2025

HashiCorp Vault Vulnerabilities Let Attack Bypass Authentication And Trigger DoS Attack

HashiCorp has disclosed two critical vulnerabilities in its Vault software that could allow attackers to bypass authentication controls and launch…

Australian scaleup to bring AI-led data protection to the MoD
27
Oct
2025

Building trustworthy technology: How AI and data can improve government

The rise of artificial intelligence (AI) has been met with both excitement and anxiety – a blend of optimism about…

Critical WordPress Post SMTP plugin flaw exposes 200K+ sites to full takeover
27
Oct
2025

Wordfence blocks 8.7M attacks exploiting old GutenKit and Hunk Companion flaws

Wordfence blocks 8.7M attacks exploiting old GutenKit and Hunk Companion flaws Pierluigi Paganini October 27, 2025 Hackers exploited old RCE…

Microsoft Faces Federal Court Action Over Alleged Misleading Conduct in Microsoft 365 Subscription Communications
27
Oct
2025

Microsoft Faces Federal Court Action Over Alleged Misleading Conduct in Microsoft 365 Subscription Communications

The Australian Competition and Consumer Commission (ACCC) has initiated proceedings in the Federal Court against Microsoft Australia Pty Ltd and…