Top 50 Cybersecurity Companies To Watch In 2025
22
Oct
2025

Top 50 Cybersecurity Companies To Watch In 2025

The top 50 cybersecurity companies of 2025 are recognized by Evolution Equity Partners for their monumental undertaking to shape the future of…

Attackers turn trusted OAuth apps into cloud backdoors
22
Oct
2025

Attackers turn trusted OAuth apps into cloud backdoors

Attackers are increasingly abusing internal OAuth-based applications to gain persistent access to cloud environments, Proofpoint researchers warn. These apps often…

Zero-click Dolby audio bug lets attackers run code on Android and Windows devices
22
Oct
2025

Zero-click Dolby audio bug lets attackers run code on Android and Windows devices

Researchers from Google’s Project Zero discovered a medium-severity remote code execution (RCE) vulnerability that affects multiple platforms, including Android (Samsung and Pixel devices) and Windows….

Bridging the Remediation Gap: Introducing Pentera Resolve
22
Oct
2025

Bridging the Remediation Gap: Introducing Pentera Resolve

From Detection to Resolution: Why the Gap Persists A critical vulnerability is identified in an exposed cloud asset. Within hours,…

Container storage: Five key things you need to know
22
Oct
2025

Container storage: Five key things you need to know

Most enterprises now run applications in containers, and so they must pay attention to how they store and manage data…

Hackers Exploit Microsoft 365 Direct Send to Evade Filters and Steal Data
22
Oct
2025

Hackers Exploit Microsoft 365 Direct Send to Evade Filters and Steal Data

Cybercriminals are increasingly exploiting a legitimate Microsoft 365 feature designed for enterprise convenience, turning Exchange Online’s Direct Send into a…

US ‘slipping’ on cybersecurity, annual Cyberspace Solarium Commission report concludes
22
Oct
2025

US ‘slipping’ on cybersecurity, annual Cyberspace Solarium Commission report concludes

The Trump administration should reverse cyber personnel and budget cuts, strengthen the Office of the National Cyber Director and expand…

Azure Apps Vulnerability Lets Hackers Create Malicious Apps Mimicking Microsoft Teams
22
Oct
2025

Azure Apps Vulnerability Lets Hackers Create Malicious Apps Mimicking Microsoft Teams

Security flaws in Microsoft’s Azure ecosystem enable cybercriminals to create deceptive applications that imitate official services like the “Azure Portal….

Axoflow Security Data Layer unifies data pipeline, storage, and analytics for security team
22
Oct
2025

Axoflow Security Data Layer unifies data pipeline, storage, and analytics for security team

Axoflow has launched its Security Data Layer, extending its pipeline offering with multiple storage solutions. The Security Data Layer addresses…

Why You Should Swap Passwords for Passphrases
22
Oct
2025

Why You Should Swap Passwords for Passphrases

Oct 22, 2025The Hacker NewsData Breach / Enterprise Security The advice didn’t change for decades: use complex passwords with uppercase,…

AI Agent, AI Assistant, Prompy Injection
22
Oct
2025

How “Unseeable Prompt Injections” Threaten AI Agents

A new form of attack is targeting browsers with built-in AI assistants. Researchers at Brave have found that seemingly harmless…

Hacker
22
Oct
2025

Sharepoint ToolShell attacks targeted orgs across four continents

Hackers believed to be associated with China have leveraged the ToolShell vulnerability (CVE-2025-53770) in Microsoft SharePoint in attacks targeting government…