A photo-illustration of computer code fading into a digital representation of a human head.
24
Nov
2025

The slow rise of SBOMs meets the rapid advance of AI

Open-source components power nearly all modern software, but they’re often buried deep in massive codebases—hiding severe vulnerabilities. For years, software…

Threats Actors Leverage Python-based Malware to Inject Process into a Legitimate Windows Binary
24
Nov
2025

Threats Actors Leverage Python-based Malware to Inject Process into a Legitimate Windows Binary

Cybersecurity researchers have uncovered a sophisticated Python-based malware that employs process injection techniques to hide inside legitimate Windows binaries. This…

LLMs Tools Like GPT-3.5-Turbo and GPT-4 Fuel the Development of Fully Autonomous Malware
24
Nov
2025

LLMs Tools Like GPT-3.5-Turbo and GPT-4 Fuel the Development of Fully Autonomous Malware

The rapid proliferation of large language models has transformed how organizations approach automation, coding, and research. Yet this technological advancement…

Grafana Flags Critical SCIM Vulnerability CVE-2025-41115
24
Nov
2025

Grafana Flags Critical SCIM Vulnerability CVE-2025-41115

Grafana Labs has issued a warning regarding a maximum-severity security flaw, identified as CVE-2025-41115, affecting its Enterprise product. The vulnerability…

Gainsight security incident
24
Nov
2025

Salesforce Updates On Gainsight Security Incident

Salesforce has issued a new update on the ongoing Salesforce Gainsight security incident, confirming additional details about the unusual activity…

When trust turns toxic: Lessons from the Salesloft Drift incident
24
Nov
2025

When trust turns toxic: Lessons from the Salesloft Drift incident

The recent Salesloft Drift breach offered a sobering reminder of how easily trust can be weaponized in today’s SaaS and…

Windows 11
24
Nov
2025

Windows 11 24H2 bug crashes Explorer and Start Menu

Microsoft has confirmed a critical Windows 11 24H2 bug that causes the File Explorer, the Start Menu, and other key…

Hackers Replace 'm' with 'rn' in Microsoft(.)com to Steal Users' Login Credentials
24
Nov
2025

Hackers Replace ‘m’ with ‘rn’ in Microsoft(.)com to Steal Users’ Login Credentials

A sophisticated phishing campaign is currently leveraging a subtle typographical trick to bypass user vigilance, deceiving victims into handing over…

Beyond Triage to Strategic Threat Hunting
24
Nov
2025

AI attack agents are accelerators, not autonomous weapons: the Anthropic attack

AI attack agents are accelerators, not autonomous weapons: the Anthropic attack Pierluigi Paganini November 24, 2025 Why today’s AI attack…

vLLM Vulnerability Enables Remote Code Execution Via Malicious Payloads
24
Nov
2025

vLLM Vulnerability Enables Remote Code Execution Via Malicious Payloads

A critical memory corruption vulnerability in vLLM versions 0.10.2 and later allows attackers to achieve remote code execution through the…

Interview: Ian Ruffle, head of data and insight, RAC
24
Nov
2025

Interview: Ian Ruffle, head of data and insight, RAC

Ian Ruffle, head of data and insight at the RAC, says the key to exploiting data assets is twofold –…

CrowdStrike Fires Suspicious Insider Linked To Hackers
24
Nov
2025

CrowdStrike Fires Suspicious Insider Linked To Hackers

Cybersecurity firm CrowdStrike confirmed the termination of a “suspicious insider” who allegedly shared internal information with hackers. The move came…