New infosec products of the week: August 22, 2025
Here’s a look at the most interesting products from the past week, featuring releases from Doppel, Druva, LastPass, and StackHawk. StackHawk empowers security teams to…
Here’s a look at the most interesting products from the past week, featuring releases from Doppel, Druva, LastPass, and StackHawk. StackHawk empowers security teams to…
Microsoft has outlined a timeline to protect its services and customers from future quantum computing threats that could render current encryption methods obsolete. Majorana 1…
A critical vulnerability in OpenAI’s latest flagship model, ChatGPT-5, allows attackers to sidestep its advanced safety features using simple phrases. The flaw, dubbed “PROMISQROUTE” by…
Orange Belgium July data breach impacted 850,000 customers Pierluigi Paganini August 22, 2025 Orange Belgium revealed that a July attack resulted in the exposure of…
NIST has released the initial public draft (IPD) of Special Publication (SP) 1331, Quick-Start Guide for Using CSF 2.0 to Improve the Management of Emerging Cybersecurity…
A software developer has been sentenced to four years in prison for sabotaging his ex-employer’s Windows network with custom malware and a kill switch that…
Chemist Warehouse is running AI on a shared email inbox for human resources queries from its 30,000 employees and store owners, using it to detect…
Apple rushed an emergency software update to its customers Wednesday to address an actively exploited zero-day vulnerability affecting the software powering the company’s most popular…
UK-based telecommunications company Colt Technology Services confirms that customer documentation was stolen as Warlock ransomware gang auctions files. The British telecommunications and network services provider…
Apple has pushed another update to its mobile operating systems, iOS and iPadOS, to address a newly-discovered zero-day that is already being exploited by threat…
The top lawmakers on a key House cybersecurity panel are hoping to remove a barrier to entry for cyber jobs in the federal government. Introduced…
Cybersecurity researchers have uncovered an ongoing campaign where threat actors exploit the critical CVE-2024-36401 vulnerability in GeoServer, a geospatial database, to remotely execute code and…