Hackers Exploit SAP Vulnerability
30
Jul
2025

Hackers Exploit SAP Vulnerability to Breach Linux Systems and Deploy Auto-Color Malware

Jul 30, 2025Ravie LakshmananVulnerability / Threat Intelligence Threat actors have been observed exploiting a now-patched critical SAP NetWeaver flaw to…

Ada Lovelace: using market forces to professionalise AI assurance
30
Jul
2025

International AI Alignment effort tackles unpredictability

The UK’s AI Security Institute is collaborating with several global institutions on a global initiative to ensure artificial intelligence (AI)…

Hackers Exploiting SAP NetWeaver Vulnerability to Deploy Auto-Color Linux Malware
30
Jul
2025

Hackers Exploiting SAP NetWeaver Vulnerability to Deploy Auto-Color Linux Malware

A sophisticated cyberattack targeting a US-based chemicals company has revealed the first observed pairing of SAP NetWeaver exploitation with Auto-Color…

Free Decryptor Released for AI-Powered FunkSec Ransomware
30
Jul
2025

Free Decryptor Released for AI-Powered FunkSec Ransomware

Researchers at Avast have unveiled a free decryptor tool for victims of the FunkSec ransomware, marking a significant step in…

"Scattered Spider" evolves with new ransomware and social engineering tactics
30
Jul
2025

“Scattered Spider” evolves with new ransomware and social engineering tactics

The loosely connected network of threat actors behind several high profile hacks known as Scattered Spider has added new ransomware…

How Simple Prompts Can Lead to Major Breaches
30
Jul
2025

How Simple Prompts Can Lead to Major Breaches

Enterprise applications integrating Large Language Models (LLMs) face unprecedented security vulnerabilities that can be exploited through deceptively simple prompt injection…

New Microsoft Guidance Targets Defense Against Indirect Prompt Injection
30
Jul
2025

New Microsoft Guidance Targets Defense Against Indirect Prompt Injection

Microsoft has unveiled new guidance addressing one of the most pressing security challenges facing enterprise AI deployments: indirect prompt injection…

Why CISOs should rethink identity risk through attack paths
30
Jul
2025

Why CISOs should rethink identity risk through attack paths

Identity-based attack paths are behind most breaches today, yet many organizations can’t actually see how those paths form. The 2025…

Critical CodeIgniter4 Vulnerability CVE-2025-54418
30
Jul
2025

Critical CodeIgniter4 Vulnerability CVE-2025-54418

A major security flaw has been detected in the popular PHP framework CodeIgniter4. The tag of a critical vulnerability, CVE-2025-54418,…

Optus brings GenAI into frontline ops
30
Jul
2025

Optus brings GenAI into frontline ops

Optus will begin using a generative AI-powered virtual agent, co-developed with Google Cloud, to interpret and support contact centre staff…

Enterprise LLMs Vulnerable to Prompt-Based Attacks Leading to Data Breaches
30
Jul
2025

Enterprise LLMs Vulnerable to Prompt-Based Attacks Leading to Data Breaches

Security researchers have discovered alarming vulnerabilities in enterprise Large Language Model (LLM) applications that could allow attackers to bypass authentication…

Artemis: Open-source modular vulnerability scanner
30
Jul
2025

Artemis: Open-source modular vulnerability scanner

Artemis is an open-source modular vulnerability scanner that checks different aspects of a website’s security and translates the results into…