Elasticsearch Server Exposed 6 Billion Records Before Shutdown
15
Oct
2025

Elasticsearch Leak Exposes 6 Billion Records from Scraping, Old and New Breaches

A misconfigured Elasticsearch server holding 1.12 terabytes of data was leaking more than 6 billion records to public access without…

Blumira rolls out SOC Auto-Focus to streamline threat investigation
15
Oct
2025

Blumira rolls out SOC Auto-Focus to streamline threat investigation

Blumira launched SOC Auto-Focus, an AI-powered security investigation tool, alongside enhancements to its Managed Service Provider (MSP) partner program. SOC…

India’s biggest IT firm to create 5,000 UK jobs
15
Oct
2025

India’s biggest IT firm to create 5,000 UK jobs

Tata Consultancy Services (TCS) is creating 5,000 jobs in the UK and talking up its contribution to the economy amid…

Chinese Hackers Leverage Geo-Mapping Tool to Maintain Year-Long Persistence
15
Oct
2025

Chinese Hackers Leverage Geo-Mapping Tool to Maintain Year-Long Persistence

The emergence of a sophisticated malware campaign leveraging geo-mapping technology has put critical infrastructure and enterprise networks on high alert….

TigerJack Hackers Target Developer Marketplaces with 11 Malicious VS Code Extensions
15
Oct
2025

TigerJack Hackers Target Developer Marketplaces with 11 Malicious VS Code Extensions

Sophisticated Threat Actor Compromises 17,000+ Developers Through Trojan Extensions That Steal Code and Mine Cryptocurrency. Operating since early 2025 under…

Unmanaged Network Resources Rival Ransomware
15
Oct
2025

Is Cybercrime The Biggest Threat To Global Business In 2025?

In a BBC World Business Report podcast episode, journalist and host Sam Fenwick takes a look at the soaring cost of…

satellite
15
Oct
2025

Satellites leak voice calls, text messages and more

Scientists from several US universities intercepted unencrypted broadcast through geostationary satellites using only off-the-shelf equipment on a university rooftop. Geostationary…

How Attackers Bypass Synced Passkeys
15
Oct
2025

How Attackers Bypass Synced Passkeys

Oct 15, 2025Ravie LakshmananData Protection / Browser Security TLDR Even if you take nothing else away from this piece, if…

NCSC proposes three-step plan to move to quantum-safe encryption
15
Oct
2025

Calls for more government support and faster investment if UK to lead in quantum computing

The UK risks squandering its potential to become a leader in the field of quantum computing without more support from…

TigerJack Hacks Infiltrated Developer Marketplaces with 11 Malicious VS Code Extensions
15
Oct
2025

TigerJack Hacks Infiltrated Developer Marketplaces with 11 Malicious VS Code Extensions

A sophisticated threat actor known as TigerJack has systematically infiltrated developer marketplaces with at least 11 malicious Visual Studio Code…

Chrome Use-After-Free Flaw Lets Attackers Execute Arbitrary Code
15
Oct
2025

Chrome Use-After-Free Flaw Lets Attackers Execute Arbitrary Code

Google has released a critical security update for Chrome browser users after discovering a dangerous use-after-free vulnerability that could allow…

Fake Google Job Offer Email Scam Targets Workspace and Microsoft 365 Users
15
Oct
2025

Fake Google Job Offer Email Scam Targets Workspace and Microsoft 365 Users

A new report from the leading cybersecurity firm Sublime Security has revealed an ongoing email scam that uses fake job…