David Jones eyes AI super-agent opportunity
19
Oct
2025

David Jones eyes AI super-agent opportunity

Retailer David Jones is in the “ideation phase” of deploying an artificial intelligence super-agent that could underpin its business modernisation…

Experian fined $3.2 million for mass-collecting personal data
19
Oct
2025

Experian fined $3.2 million for mass-collecting personal data

Experian Netherlands has been fined EUR 2.7 million ($3.2 million) for multiple violations of the General Data Protection Regulation (GDPR) The…

Why I Think Karpathy is Wrong on the AGI Timeline
19
Oct
2025

Why I Think Karpathy is Wrong on the AGI Timeline

Andrej Karpathy came on Dwarkesh’s podcast recently, and I have a number of thoughts. Many are saying that Karpathy thinks…

TikTok
19
Oct
2025

TikTok videos continue to push infostealers in ClickFix attacks

Cybercriminals are using TikTok videos disguised as free activation guides for popular software like Windows, Spotify, and Netflix to spread…

Security Affairs newsletter Round 527 by Pierluigi Paganini – INTERNATIONAL EDITION
19
Oct
2025

Security Affairs newsletter Round 546 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs newsletter Round 546 by Pierluigi Paganini – INTERNATIONAL EDITION Pierluigi Paganini October 19, 2025 A new round of…

The Identity Renaissance: Redefining Digital Trust for a New Era
19
Oct
2025

The Identity Renaissance: Redefining Digital Trust for a New Era

Cybersecurity has made remarkable strides over the past decade. We have seen the rise of AI-driven threat detection, cloud-native architecture,…

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 65
19
Oct
2025

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 67

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape Malware…

The Ghost in the Machine: How Ai Turned Voice into the Ultimate Cyber Weapon
19
Oct
2025

The Ghost in the Machine: How Ai Turned Voice into the Ultimate Cyber Weapon

For years, vishing (voice phishing) was the clumsy cousin of cybercrime, relying on crude robocalls and easily detectable scripts. That…

PoC Exploit Released for Linux-PAM Vulnerability Allowing Root Privilege Escalation
19
Oct
2025

PoC Exploit Released for Linux-PAM Vulnerability Allowing Root Privilege Escalation

A high-severity vulnerability in the Pluggable Authentication Modules (PAM) framework was assigned the identifier CVE-2025-8941. This vulnerability stems from the…

WatchGuard VPN Vulnerability Let Remote Attacker Execute Arbitrary Code
19
Oct
2025

WatchGuard VPN Vulnerability Let Remote Attacker Execute Arbitrary Code

WatchGuard has disclosed a critical out-of-bounds write vulnerability in its Fireware OS, enabling remote unauthenticated attackers to execute arbitrary code…

19
Oct
2025

WatchGuard VPN Vulnerability Let Remote Attacker Execute Arbitrary Code

WatchGuard has disclosed a critical out-of-bounds write vulnerability in its Fireware OS, enabling remote unauthenticated attackers to execute arbitrary code…

Week in review: F5 data breach, Microsoft patches three actively exploited zero-days
19
Oct
2025

Week in review: F5 data breach, Microsoft patches three actively exploited zero-days

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Building a healthcare cybersecurity strategy…