New infosec products of the week: October 17, 2025
17
Oct
2025

New infosec products of the week: October 17, 2025

Here’s a look at the most interesting products from the past week, featuring releases from Aura, Bitsight, Blumira, Cayosoft, Corelight,…

Cisco IOS and IOS XE Software Vulnerabilities Let Attackers Execute Remote Code
17
Oct
2025

Cisco IOS and IOS XE Software Vulnerabilities Let Attackers Execute Remote Code

Cisco has disclosed a severe vulnerability in its widely used IOS and IOS XE Software, potentially allowing attackers to crash…

Banking scams up 65% globally in last year
17
Oct
2025

Banking scams up 65% globally in last year

A new report from BioCatch points to the explosive and exponential growth of scams all around the world. The research…

What does it mean to be ‘AI ready’?
17
Oct
2025

What does it mean to be ‘AI ready’?

It’s not a simple riddle to crack. Last year, Gartner reported that 92% of CIOs expected AI to be implemented…

F5 Cybersecurity Breach Sparks National Security Concerns, ASD Issues Urgent Advisory
17
Oct
2025

F5 Cybersecurity Breach Sparks National Security Concerns, ASD Issues Urgent Advisory

The Australian Signals Directorate’s (ASD) Australian Cyber Security Centre (ACSC) has issued an urgent advisory following a significant cybersecurity incident…

Southeast Asia lags in child online safety protection amid rising risks, new index shows
17
Oct
2025

Southeast Asia lags in child online safety protection amid rising risks, new index shows

Southeast Asia’s children are among the world’s most exposed to online risks – and among the least protected. That is…

Think Your Firewall Is Safe? The F5 Hack Proves It’s the Perfect Trojan Horse
17
Oct
2025

Think Your Firewall Is Safe? The F5 Hack Proves It’s the Perfect Trojan Horse

Think Your Firewall Is Safe? The F5 Hack Proves It’s the Perfect Trojan Horse Skip to content We use cookies…

17
Oct
2025

Think Your Firewall Is Safe? The F5 Hack Proves It’s the Perfect Trojan Horse

Think Your Firewall Is Safe? The F5 Hack Proves It’s the Perfect Trojan Horse Skip to content We use cookies…

WIndows 11
17
Oct
2025

Windows 11 updates break localhost (127.0.0.1) HTTP/2 connections

Microsoft’s October Windows 11 updates have broken the “localhost” functionality, making applications that connect back to 127.0.0.1 over HTTP/2 no longer…

North Korean operatives spotted using evasive techniques to steal data and cryptocurrency
17
Oct
2025

North Korean operatives spotted using evasive techniques to steal data and cryptocurrency

North Korean operatives that dupe job seekers into installing malicious code on their devices have been spotted using new malware…

satellite IP traffic security
17
Oct
2025

Unencrypted Satellite IP Traffic Is A Widespread Problem

Satellite links contain a surprising amount of unencrypted traffic – and perhaps even more surprising is the fact that the…

Why the F5 Hack Created an ‘Imminent Threat’ for Thousands of Networks
16
Oct
2025

Why the F5 Hack Created an ‘Imminent Threat’ for Thousands of Networks

Thousands of networks—many of them operated by the US government and Fortune 500 companies—face an “imminent threat” of being breached…