What Microsoft’s 2025 report reveals about the new rules of engagement in cyberdefense
24
Oct
2025

What Microsoft’s 2025 report reveals about the new rules of engagement in cyberdefense

Adversaries are using AI to sharpen attacks, automate operations, and challenge long-standing defenses, according to a new Microsoft report. Researchers…

AWS outage caused by
24
Oct
2025

AWS outage caused by “unlikely interaction” between automated systems

The Amazon Web Services outage in North Virginia was caused by a software bug in an automated DNS management system…

Hackers Abuse Microsoft 365 Exchange Direct Send to Bypass Content Filters and Harvest Sensitive Data
24
Oct
2025

Hackers Abuse Microsoft 365 Exchange Direct Send to Bypass Content Filters and Harvest Sensitive Data

Microsoft 365 Exchange Online’s Direct Send feature, originally designed to enable legacy devices and applications to send emails without authentication,…

Hackers Steal Microsoft Teams Chats & Emails by Grabbing Access Tokens
24
Oct
2025

Hackers Steal Microsoft Teams Chats & Emails by Grabbing Access Tokens

Security researchers have discovered a sophisticated method that allows attackers to steal access tokens from Microsoft Teams, potentially granting unauthorized…

Smart helmet tech points to the future of fighting audio deepfakes
24
Oct
2025

Smart helmet tech points to the future of fighting audio deepfakes

Voice cloning has become fast, cheap, and convincing. With only a few minutes of recorded speech, generative models can recreate…

ACMA rejects draft consumer code as calls to end self-regulation grow louder
24
Oct
2025

ACMA rejects draft consumer code as calls to end self-regulation grow louder

The Australian Communications and Media Authority (ACMA) has accused carriers of taking a weak stance when it comes to safeguarding…

Bitter APT Hackers Exploit WinRAR Zero-Day Via Weaponized Word Documents to Steal Sensitive Data
24
Oct
2025

Bitter APT Hackers Exploit WinRAR Zero-Day Via Weaponized Word Documents to Steal Sensitive Data

The Bitter APT group, also tracked as APT-Q-37 and known in China as 蔓灵花, has launched a sophisticated cyberespionage campaign…

Ransomware Actors Target VMware Deployments
24
Oct
2025

Ransomware Actors Target VMware Deployments

The Agenda ransomware group has evolved its attack methodology with a sophisticated technique that deploys Linux ransomware variants directly on…

When AI writes code, humans clean up the mess
24
Oct
2025

When AI writes code, humans clean up the mess

AI coding tools are reshaping how software is written, tested, and secured. They promise speed, but that speed comes with…

AI Sidebar Spoofing Attack: SquareX Uncovers Malicious Extensions that Impersonate AI Browser Sidebars
24
Oct
2025

AI Sidebar Spoofing Attack: SquareX Uncovers Malicious Extensions that Impersonate AI Browser Sidebars

SquareX released critical research exposing a new class of attack targeting AI browsers. The AI Sidebar Spoofing attack leverages malicious…

AI Sidebar Spoofing Attack: SquareX Uncovers Malicious Extensions that Impersonate AI Browser Sidebars - GBHackers Security
24
Oct
2025

AI Sidebar Spoofing Attack: SquareX Uncovers Malicious Extensions that Impersonate AI Browser Sidebars – GBHackers Security

SquareX released critical research exposing a new class of attack targeting AI browsers. The AI Sidebar Spoofing attack leverages malicious…

New infosec products of the week: October 24, 2025
24
Oct
2025

New infosec products of the week: October 24, 2025

Here’s a look at the most interesting products from the past week, featuring releases from Axoflow, Elastic, Illumio, Keycard, Netscout…