Keycard emerges from stealth with identity and access solution for AI agents
22
Oct
2025

Keycard emerges from stealth with identity and access solution for AI agents

Keycard emerged from stealth with its identity and access platform for AI agents that integrates with organizations’ existing user identity…

TARmageddon Flaw in Async-Tar Rust Library Could Enable Remote Code Execution
22
Oct
2025

TARmageddon Flaw in Async-Tar Rust Library Could Enable Remote Code Execution

Oct 22, 2025Ravie LakshmananVulnerability / Data Protection Cybersecurity researchers have disclosed details of a high-severity flaw impacting the popular async-tar…

Cyberattack Disrupts Heywood Hospital And Athol Hospital
22
Oct
2025

Cyberattack Disrupts Heywood Hospital And Athol Hospital

A cyberattack on hospitals in North Central Massachusetts has caused major operational disruptions at Heywood Hospital in Gardner and Athol…

ZYXEL Authorization Bypass Vulnerability Let Attackers View and Download System Configuration
22
Oct
2025

ZYXEL Authorization Bypass Vulnerability Let Attackers View and Download System Configuration

A critical authorization bypass vulnerability has emerged in ZYXEL’s ATP and USG series network security appliances, allowing attackers to circumvent…

New Rust Malware “ChaosBot” Hides Command-and-Control Inside Discord
22
Oct
2025

New Rust Malware “ChaosBot” Hides Command-and-Control Inside Discord

A sophisticated, Rust-based malware dubbed ChaosBot has been exposed utilizing the Discord platform for its Command and Control (C2) operations….

caminho, caminho loader, Brazil, Eastern Europe,
22
Oct
2025

Brazilian “Caminho” Loader Uses Images In Malware Delivery

A newly identified loader dubbed “Caminho” (Portuguese for “path”) has emerged as a sophisticated Loader-as-a-Service platform that uses Least Significant…

Threat Actors Compromise Xubuntu Website To Deliver Malicious Windows Executable
22
Oct
2025

Threat Actors Compromise Xubuntu Website To Deliver Malicious Windows Executable

Threat actors infiltrated the official Xubuntu website, redirecting torrent downloads to a malicious ZIP file containing Windows-targeted malware. The incident,…

Millions of Credentials Stolen Each Day by Stealer Malware
22
Oct
2025

Millions of Credentials Stolen Each Day by Stealer Malware

The cybercrime ecosystem surrounding stealer malware has reached unprecedented scale, with threat actors now processing millions of stolen credentials daily…

Life, death, and online identity: What happens to your online accounts after death?
22
Oct
2025

Life, death, and online identity: What happens to your online accounts after death?

The rapid technological advances of recent decades have transformed nearly every aspect of our lives. One major shift is that…

Ransomware Targets VPNs, Microsoft 365 In APAC Surge
22
Oct
2025

Ransomware Targets VPNs, Microsoft 365 In APAC Surge

The Asia-Pacific (APAC) region is seeing a rapid surge in number of cyberattacks aimed at its enterprises’, a new report…

Russia-linked COLDRIVER speeds up malware evolution after LOSTKEYS exposure
22
Oct
2025

Russia-linked COLDRIVER speeds up malware evolution after LOSTKEYS exposure

Russia-linked COLDRIVER speeds up malware evolution after LOSTKEYS exposure Pierluigi Paganini October 22, 2025 Russia-linked COLDRIVER rapidly evolved its malware…

Hackers Exploited 34 Zero-Day Vulnerabilities And Earned $522,500 In Pwn2Own Ireland 2025
22
Oct
2025

Hackers Exploited 34 Zero-Day Vulnerabilities And Earned $522,500 In Pwn2Own Ireland 2025

The first day of Pwn2Own Ireland 2025 wrapped up with a bang, as security researchers uncovered 34 unique zero-day vulnerabilities…