Hackers Using TikTok Videos to Deploy Self-Compiling Malware That Leverages PowerShell for Execution
17
Oct
2025

Hackers Using TikTok Videos to Deploy Self-Compiling Malware That Leverages PowerShell for Execution

Cybercriminals are exploiting TikTok’s massive user base to distribute sophisticated malware campaigns that promise free software activation but deliver dangerous…

From AI to Generative AI: The Evolution of Cloud Security Operations
17
Oct
2025

From AI to Generative AI: The Evolution of Cloud Security Operations

Cloud Security plays a crucial role in the field of information security operations, handling much of the heavy lifting needed…

ClickFake Interview Campaign Used by Threat Actors to Deliver OtterCandy Malware
17
Oct
2025

ClickFake Interview Campaign Used by Threat Actors to Deliver OtterCandy Malware

A North Korean-linked group, WaterPlum’s Cluster B, has evolved its tactics by introducing OtterCandy—a Node.js–based RAT and information stealer—through the…

North Korean Hackers Combine BeaverTail and OtterCookie into Advanced JS Malware
17
Oct
2025

North Korean Hackers Combine BeaverTail and OtterCookie into Advanced JS Malware

The North Korean threat actor linked to the Contagious Interview campaign has been observed merging some of the functionality of…

Threat Actors Leveraging ClickFake Interview Attack to Deploy OtterCandy Malware
17
Oct
2025

Threat Actors Leveraging ClickFake Interview Attack to Deploy OtterCandy Malware

Cybercriminals associated with the North Korean threat group WaterPlum, also known as Famous Chollima or PurpleBravo, have escalated their activities…

WatchGuard VPN Flaw Allows Remote Attackers to Execute Arbitrary Code
17
Oct
2025

WatchGuard VPN Flaw Allows Remote Attackers to Execute Arbitrary Code

A critical security vulnerability has been discovered in WatchGuard Firebox appliances that could allow remote attackers to execute arbitrary code…

Can LLMs understand scientists? | Computer Weekly
17
Oct
2025

AI talent war sees UBS recruit leadership from JPMorgan

UBS has recruited artificial intelligence (AI) leadership from US banking giant JPMorgan, as the war on AI talent heats up…

Chrome Bug CVE-2025-11756 Puts Safe Browsing At Risk
17
Oct
2025

Chrome Bug CVE-2025-11756 Puts Safe Browsing At Risk

Google has issued an urgent security update for its Chrome browser, addressing a high-severity vulnerability tracked as CVE-2025-11756. This flaw,…

Wing FTP Server flaw actively exploited shortly after technical details were made public
17
Oct
2025

A critical WatchGuard Fireware flaw could allow unauthenticated code execution

A critical WatchGuard Fireware flaw could allow unauthenticated code execution Pierluigi Paganini October 17, 2025 A critical WatchGuard Fireware vulnerability,…

Windows
17
Oct
2025

Microsoft fixes Windows bug breaking localhost HTTP connections

Microsoft has fixed a known issue breaking HTTP/2 localhost (127.0.0.1) connections and IIS websites after installing recent Windows security updates….

ConnectWise Vulnerabilities Allow Attackers To Inject Malicious Updates
17
Oct
2025

ConnectWise Vulnerabilities Allow Attackers To Inject Malicious Updates

ConnectWise released a critical security update for its Automate platform on October 16, 2025. The patch, version 2025.9, addresses serious…

Attackers Exploit Zendesk Authentication Issue to Flood Targets’ Inboxes with Corporate Notifications
17
Oct
2025

Attackers Exploit Zendesk Authentication Issue to Flood Targets’ Inboxes with Corporate Notifications

Cybercriminals have discovered a gap in Zendesk’s ticket submission process and are using it to bombard victims with waves of…