Unencrypted Satellite IP Traffic Is A Widespread Problem
Satellite links contain a surprising amount of unencrypted traffic – and perhaps even more surprising is the fact that the researchers who discovered that unencrypted…
Satellite links contain a surprising amount of unencrypted traffic – and perhaps even more surprising is the fact that the researchers who discovered that unencrypted…
Thousands of networks—many of them operated by the US government and Fortune 500 companies—face an “imminent threat” of being breached by a nation-state hacking group…
Microsoft has blunted the effectiveness of a ransomware threat actor targeting Teams users by revoking over 200 certificates for a key component in the digital extortionists’ attack…
Operation Zero Disco: Threat actors targets Cisco SNMP flaw to drop Linux rootkits Pierluigi Paganini October 16, 2025 Hackers exploit Cisco SNMP flaw CVE-2025-20352 in…
Hackers stole the personal information of over 17.6 million people after breaching the systems of financial services company Prosper. Prosper operates as a peer-to-peer lending…
Westpac is anticipating a role for AI at every stage of the business lending process, building on the benefits it has already derived from applying…
Major international auction house Sotheby’s is notifying customers of a data breach incident on its systems where threat actors stole sensitive information, including financial details.…
Threat actors exploited a recently patched remote code execution vulnerability (CVE-2025-20352) in older, unprotected Cisco networking devices to deploy a Linux rootkit and gain persistent…
A misconfigured server belonging to Indian company NetcoreCloud exposed 40 billion records and 13.4TB of data, revealing sensitive emails and internal details from global clients.…
North Korean hackers have adopted the ‘EtherHiding’ technique that leverages smart contracts to host and deliver malware in social engineering campaigns that steal cryptocurrency. Google Threat…
Early October 2025 witnessed the resurgence of a retro phishing technique that exploits legacy Basic Authentication URLs to deceive users into divulging sensitive credentials. Threat…
The Criminal Cases Review Commission (CCRC) has formally referred the first appeal against conviction of a Post Office Capture user to the Court of Appeal,…