CISA warns of Lanscope Endpoint Manager flaw exploited in attacks
23
Oct
2025

CISA warns of Lanscope Endpoint Manager flaw exploited in attacks

The Cybersecurity & Infrastructure Security Agency (CISA) is warning that hackers are exploiting a critical vulnerability in the Motex Landscope…

Perplexity’s Comet Browser Screenshot Feature Vulnerability Let Attackers Inject Malicious Prompts
23
Oct
2025

Perplexity’s Comet Browser Screenshot Feature Vulnerability Let Attackers Inject Malicious Prompts

A new vulnerability in Perplexity’s Comet AI browser allows attackers to inject malicious prompts through seemingly innocuous screenshots. Disclosed on…

Jira Vulnerability Lets Attackers Alter Files Accessible to the Jira JVM Process
23
Oct
2025

Jira Vulnerability Lets Attackers Alter Files Accessible to the Jira JVM Process

Atlassian has disclosed a critical path traversal vulnerability affecting Jira Software Data Center and Server that could allow authenticated attackers…

North Korean Hackers Lure Defense Engineers With Fake Jobs to Steal Drone Secrets
23
Oct
2025

North Korean Hackers Lure Defense Engineers With Fake Jobs to Steal Drone Secrets

Oct 23, 2025Ravie LakshmananCyber Espionage / Threat Intelligence Threat actors with ties to North Korea have been attributed to a…

From malware to deepfakes, Gen AI is transforming cyberattacks
23
Oct
2025

Burned-out security leaders view AI as double-edged sword

Dive Brief: Overwhelmed cybersecurity executives hope AI can help them avoid missing signs of intrusions, even as they remain wary…

Hackers Exploited Samsung Galaxy S25 0-Day Vulnerability to Enable Camera and Track Location
23
Oct
2025

Hackers Exploited Samsung Galaxy S25 0-Day Vulnerability to Enable Camera and Track Location

At Pwn2Own Ireland 2025, cybersecurity researchers Ben R. and Georgi G. from Interrupt Labs showcased an impressive achievement by successfully…

Stealthy Malware Leveraging Variable Functions and Cookies for Evasion
23
Oct
2025

Stealthy Malware Leveraging Variable Functions and Cookies for Evasion

Cybersecurity researchers at Wordfence Threat Intelligence and their Care and Response teams have observed a persistent trend in new malware…

Post Office scandal inquiry to publish first findings this summer
23
Oct
2025

Ministry of Justice’s OpenAI deal paves way to sovereign AI

The Ministry of Justice (MoJ) has signed a Memorandum of Understanding (MoU) with OpenAI to provide civil servants with access…

[tl;dr sec] #302 - LLM Honeypot Catches Threat Actor, Supply Chain Compromise Survey, AI-powered Malware
23
Oct
2025

[tl;dr sec] #302 – LLM Honeypot Catches Threat Actor, Supply Chain Compromise Survey, AI-powered Malware

CAB This week Semgrep had our Customer Advisory Board (CAB), where I got to hang out with and learn from…

Climbing costs, skills loss and other AI warnings for CIOs
23
Oct
2025

Climbing costs, skills loss and other AI warnings for CIOs

ORLANDO, Fla. — As CIOs lead their organizations through AI-driven change, runaway costs and accuracy hiccups continue to threaten momentum,…

New AI attack hides data-theft prompts in downscaled images
23
Oct
2025

Spoofed AI sidebars can trick Atlas, Comet users into dangerous actions

OpenAI’s Atlas and Perplexity’s Comet browsers are vulnerable to attacks that spoof the built-in AI sidebar and can lead users into…

SpaceX Disabled 2,500+ Starlink Terminals Tied to Scam Centers in Myanmar
23
Oct
2025

SpaceX Disabled 2,500+ Starlink Terminals Tied to Scam Centers in Myanmar

SpaceX has disabled over 2,500 Starlink satellite internet terminals linked to notorious scam centers in Myanmar. The action underscores the…