New York updates third-party risk guidance, adds AI provisions
23
Oct
2025

New York updates third-party risk guidance, adds AI provisions

The New York Department of Financial Services published updates this week to longstanding industry guidance that urges financial services companies…

Microsoft
23
Oct
2025

Microsoft disables File Explorer preview for downloads to block attacks

Microsoft says that the File Explorer (formerly Windows Explorer) now automatically blocks previews for files downloaded from the Internet to…

TransparentTribe Targets Linux Systems in Indian Military to Deploy DeskRAT
23
Oct
2025

TransparentTribe Targets Linux Systems in Indian Military to Deploy DeskRAT

In July 2025, cybersecurity firm CYFIRMA uncovered an active phishing campaign targeting Linux-based operating systems used by Indian government and…

Abu Dhabi bets on autonomous racing to accelerate AI and mobility innovation
23
Oct
2025

Abu Dhabi bets on autonomous racing to accelerate AI and mobility innovation

Abu Dhabi is turning racetracks into laboratories – on the Yas Marina circuit, better known for hosting Formula One, the…

CISA warns of Lanscope Endpoint Manager flaw exploited in attacks
23
Oct
2025

CISA warns of Lanscope Endpoint Manager flaw exploited in attacks

The Cybersecurity & Infrastructure Security Agency (CISA) is warning that hackers are exploiting a critical vulnerability in the Motex Landscope…

Perplexity’s Comet Browser Screenshot Feature Vulnerability Let Attackers Inject Malicious Prompts
23
Oct
2025

Perplexity’s Comet Browser Screenshot Feature Vulnerability Let Attackers Inject Malicious Prompts

A new vulnerability in Perplexity’s Comet AI browser allows attackers to inject malicious prompts through seemingly innocuous screenshots. Disclosed on…

Jira Vulnerability Lets Attackers Alter Files Accessible to the Jira JVM Process
23
Oct
2025

Jira Vulnerability Lets Attackers Alter Files Accessible to the Jira JVM Process

Atlassian has disclosed a critical path traversal vulnerability affecting Jira Software Data Center and Server that could allow authenticated attackers…

North Korean Hackers Lure Defense Engineers With Fake Jobs to Steal Drone Secrets
23
Oct
2025

North Korean Hackers Lure Defense Engineers With Fake Jobs to Steal Drone Secrets

Oct 23, 2025Ravie LakshmananCyber Espionage / Threat Intelligence Threat actors with ties to North Korea have been attributed to a…

From malware to deepfakes, Gen AI is transforming cyberattacks
23
Oct
2025

Burned-out security leaders view AI as double-edged sword

Dive Brief: Overwhelmed cybersecurity executives hope AI can help them avoid missing signs of intrusions, even as they remain wary…

Hackers Exploited Samsung Galaxy S25 0-Day Vulnerability to Enable Camera and Track Location
23
Oct
2025

Hackers Exploited Samsung Galaxy S25 0-Day Vulnerability to Enable Camera and Track Location

At Pwn2Own Ireland 2025, cybersecurity researchers Ben R. and Georgi G. from Interrupt Labs showcased an impressive achievement by successfully…

Stealthy Malware Leveraging Variable Functions and Cookies for Evasion
23
Oct
2025

Stealthy Malware Leveraging Variable Functions and Cookies for Evasion

Cybersecurity researchers at Wordfence Threat Intelligence and their Care and Response teams have observed a persistent trend in new malware…

Post Office scandal inquiry to publish first findings this summer
23
Oct
2025

Ministry of Justice’s OpenAI deal paves way to sovereign AI

The Ministry of Justice (MoJ) has signed a Memorandum of Understanding (MoU) with OpenAI to provide civil servants with access…