Hackers Exploited 34 Zero-Day Vulnerabilities And Earned $522,500 In Pwn2Own Ireland 2025
22
Oct
2025

Hackers Exploited 34 Zero-Day Vulnerabilities And Earned $522,500 In Pwn2Own Ireland 2025

The first day of Pwn2Own Ireland 2025 wrapped up with a bang, as security researchers uncovered 34 unique zero-day vulnerabilities…

For blind people, staying safe online means working around the tools designed to help
22
Oct
2025

For blind people, staying safe online means working around the tools designed to help

Blind and low-vision users face the same password challenges as everyone else, but the tools meant to make security easier…

Hidden
22
Oct
2025

Hidden “Glassworm” malware spreads through infected VS Code extensions

A new malware worm campaign has infected multiple Microsoft Visual Studio Code extensions using invisible Unicode characters to hide malicious…

New Salt Typhoon Attacks Leverage Zero-Days and DLL Sideloading
22
Oct
2025

New Salt Typhoon Attacks Leverage Zero-Days and DLL Sideloading

Salt Typhoon represents one of the most persistent and sophisticated cyber threats targeting global critical infrastructure today. Believed to be…

OpenFGA: The open-source engine redefining access control
22
Oct
2025

OpenFGA: The open-source engine redefining access control

OpenFGA is an open-source, high-performance, and flexible authorization engine inspired by Google’s Zanzibar system for relationship-based access control. It helps…

TP-Link Patches Four Omada Gateway Flaws
22
Oct
2025

TP-Link Patches Four Omada Gateway Flaws, Two Allow Remote Code Execution

Oct 22, 2025Ravie LakshmananVulnerability / Network Security TP-Link has released security updates to address four security flaws impacting Omada gateway…

Hackers Exploit OAuth Apps to Keep Cloud Access Even After Password Resets
22
Oct
2025

Hackers Exploit OAuth Apps to Keep Cloud Access Even After Password Resets

Cloud account takeover attacks have evolved beyond simple credential theft. Cybercriminals are now exploiting OAuth applications to maintain persistent access…

Companies want the benefits of AI without the cyber blowback
22
Oct
2025

Companies want the benefits of AI without the cyber blowback

51% of European IT and cybersecurity professionals said they expect AI-driven cyber threats and deepfakes to keep them up at…

Chrome V8 JavaScript Engine Vulnerability Let Attackers Execute Remote Code
22
Oct
2025

Chrome V8 JavaScript Engine Vulnerability Let Attackers Execute Remote Code

Google has swiftly addressed a high-severity flaw in its Chrome browser’s V8 JavaScript engine, releasing an emergency update to thwart…

AI Disruption and Quantum Risks Emerge as Top Concerns for Critical Infrastructure Security
22
Oct
2025

AI Disruption and Quantum Risks Emerge as Top Concerns for Critical Infrastructure Security

Thales has released the findings of its 2025 Data Threat Report: Critical Infrastructure Edition, which reveals that operators in energy, utilities, telecommunications…

Singapore International Cyber Week 2025: Shaping the Future of Cyber Resilience in the Indo-Pacific
22
Oct
2025

Singapore International Cyber Week 2025: Shaping the Future of Cyber Resilience in the Indo-Pacific

Singapore International Cyber Week (SICW) 2025 opened this week with a powerful message — cybersecurity has become the defining currency…

ACMA cracks down on mobile 000 'camp-on' failures
22
Oct
2025

ACMA cracks down on mobile 000 ‘camp-on’ failures

The Australian Communications and Media Authority has tightened mobile phone testing standards and imposed new network equipment monitoring rules on…