Chinese Threat Actors Exploit ToolShell SharePoint Flaw Weeks After Microsoft's July Patch
22
Oct
2025

Chinese Threat Actors Exploit ToolShell SharePoint Flaw Weeks After Microsoft’s July Patch

Oct 22, 2025Ravie LakshmananCyber Espionage / Vulnerability Threat actors with ties to China exploited the ToolShell security vulnerability in Microsoft…

Podcast: SSD for high performance, but HDD suits ‘warm’ workloads
22
Oct
2025

Podcast: SSD for high performance, but HDD suits ‘warm’ workloads

In this podcast, we talk to Axel Stoermann, Kioxia’s vice-president and chief technology officer for memory and solid-state disk (SSD)…

Hacking smarter with Burp AI: NahamSec puts Burp AI to the test | Blog
22
Oct
2025

Burp AI takes on a vulnerable web app: watch Tib3rius put Burp’s new agentic capabilities to the test | Blog

Amelia Coen | 22 October 2025 at 12:59 UTC What happens when you set Burp AI loose on a deliberately…

Critical Vulnerability In Oracle E-Business Suite's Marketing Product Allows Full Access To Attackers
22
Oct
2025

Critical Vulnerability In Oracle E-Business Suite’s Marketing Product Allows Full Access To Attackers

Oracle has disclosed two critical vulnerabilities in its E-Business Suite’s Marketing product that could hand full control to remote attackers….

SharkStealer Adopts EtherHiding Technique for C2 Communication Evasion
22
Oct
2025

SharkStealer Adopts EtherHiding Technique for C2 Communication Evasion

SharkStealer, a Golang-based information stealer, has been observed leveraging the Binance Smart Chain (BSC) Testnet as a covert dead-drop mechanism…

Top 50 Cybersecurity Companies To Watch In 2025
22
Oct
2025

Top 50 Cybersecurity Companies To Watch In 2025

The top 50 cybersecurity companies of 2025 are recognized by Evolution Equity Partners for their monumental undertaking to shape the future of…

Attackers turn trusted OAuth apps into cloud backdoors
22
Oct
2025

Attackers turn trusted OAuth apps into cloud backdoors

Attackers are increasingly abusing internal OAuth-based applications to gain persistent access to cloud environments, Proofpoint researchers warn. These apps often…

Zero-click Dolby audio bug lets attackers run code on Android and Windows devices
22
Oct
2025

Zero-click Dolby audio bug lets attackers run code on Android and Windows devices

Researchers from Google’s Project Zero discovered a medium-severity remote code execution (RCE) vulnerability that affects multiple platforms, including Android (Samsung and Pixel devices) and Windows….

Bridging the Remediation Gap: Introducing Pentera Resolve
22
Oct
2025

Bridging the Remediation Gap: Introducing Pentera Resolve

From Detection to Resolution: Why the Gap Persists A critical vulnerability is identified in an exposed cloud asset. Within hours,…

Container storage: Five key things you need to know
22
Oct
2025

Container storage: Five key things you need to know

Most enterprises now run applications in containers, and so they must pay attention to how they store and manage data…

Hackers Exploit Microsoft 365 Direct Send to Evade Filters and Steal Data
22
Oct
2025

Hackers Exploit Microsoft 365 Direct Send to Evade Filters and Steal Data

Cybercriminals are increasingly exploiting a legitimate Microsoft 365 feature designed for enterprise convenience, turning Exchange Online’s Direct Send into a…

US ‘slipping’ on cybersecurity, annual Cyberspace Solarium Commission report concludes
22
Oct
2025

US ‘slipping’ on cybersecurity, annual Cyberspace Solarium Commission report concludes

The Trump administration should reverse cyber personnel and budget cuts, strengthen the Office of the National Cyber Director and expand…