Oct 22, 2025Ravie LakshmananCyber Espionage / Vulnerability Threat actors with ties to China exploited the ToolShell security vulnerability in Microsoft…
In this podcast, we talk to Axel Stoermann, Kioxia’s vice-president and chief technology officer for memory and solid-state disk (SSD)…
Amelia Coen | 22 October 2025 at 12:59 UTC What happens when you set Burp AI loose on a deliberately…
Oracle has disclosed two critical vulnerabilities in its E-Business Suite’s Marketing product that could hand full control to remote attackers….
SharkStealer, a Golang-based information stealer, has been observed leveraging the Binance Smart Chain (BSC) Testnet as a covert dead-drop mechanism…
The top 50 cybersecurity companies of 2025 are recognized by Evolution Equity Partners for their monumental undertaking to shape the future of…
Attackers are increasingly abusing internal OAuth-based applications to gain persistent access to cloud environments, Proofpoint researchers warn. These apps often…
Researchers from Google’s Project Zero discovered a medium-severity remote code execution (RCE) vulnerability that affects multiple platforms, including Android (Samsung and Pixel devices) and Windows….
From Detection to Resolution: Why the Gap Persists A critical vulnerability is identified in an exposed cloud asset. Within hours,…
Most enterprises now run applications in containers, and so they must pay attention to how they store and manage data…
Cybercriminals are increasingly exploiting a legitimate Microsoft 365 feature designed for enterprise convenience, turning Exchange Online’s Direct Send into a…
The Trump administration should reverse cyber personnel and budget cuts, strengthen the Office of the National Cyber Director and expand…











