Malicious crypto-stealing VSCode extensions resurface on OpenVSX
15
Oct
2025

Malicious crypto-stealing VSCode extensions resurface on OpenVSX

A threat actor called TigerJack is constantly targeting developers with malicious extensions published on Microsoft’s Visual Code (VSCode) marketplace and OpenVSX…

Support for Windows 10 Ends Today Leaving Users Vulnerable to Cyberattacks
15
Oct
2025

Support for Windows 10 Ends Today Leaving Users Vulnerable to Cyberattacks

Microsoft officially ended support for Windows 10, marking the close of a decade-long era for one of the most popular…

A New Attack Lets Hackers Steal 2-Factor Authentication Codes From Android Phones
15
Oct
2025

A New Attack Lets Hackers Steal 2-Factor Authentication Codes From Android Phones

Android devices are vulnerable to a new attack that can covertly steal two-factor authentication codes, location timelines, and other private data…

security
15
Oct
2025

Security firms dispute credit for overlapping CVE reports

Cybersecurity company FuzzingLabs has accused the Y Combinator-backed startup, Gecko Security, of replicating its vulnerability disclosures and backdating blog posts. According…

FortiOS CLI Command Bypass Vulnerability Let Attacker Execute System Commands
15
Oct
2025

FortiOS CLI Command Bypass Vulnerability Let Attacker Execute System Commands

Fortinet disclosed a high-severity vulnerability in its FortiOS operating system on October 14, 2025, that could enable local authenticated attackers…

National Archives identifies four
14
Oct
2025

National Archives identifies four “areas of interest” for AI

The National Archives of Australia is getting ready to test AI across a wide range of operations in maintaining its…

Researchers find a startlingly cheap way to steal your secrets from space 
14
Oct
2025

Researchers find a startlingly cheap way to steal your secrets from space 

How much private and sensitive data can you get by pointing $600 worth of satellite equipment at the sky? Quite…

Microsoft Exchange Server
14
Oct
2025

Exchange 2016 and 2019 have reached end of support

Microsoft has reminded that Exchange Server 2016 and 2019 reached the end of support and advised IT administrators to upgrade…

New Cyberattack Leverages NPM Ecosystem to Infect Developers While Installing Packages
14
Oct
2025

New Cyberattack Leverages NPM Ecosystem to Infect Developers While Installing Packages

Cybersecurity researchers have uncovered a sophisticated phishing campaign that weaponizes the NPM ecosystem through an unprecedented attack vector. Unlike traditional…

Patch Tuesday October 2025: Three Zero-days Under Attack
14
Oct
2025

Patch Tuesday October 2025: Three Zero-days Under Attack

Microsoft’s Patch Tuesday October 2025 included fixes for 175 vulnerabilities, including three exploited zero-days and 13 additional high-risk vulnerabilities. The…

National photo licence recognition system set to go live in 2025
14
Oct
2025

National photo licence recognition system set to go live in 2025

The Australian government is set to launch its long-awaited National Driver Licence Facial Recognition Solution by the end of the…

New Android Pixnapping attack steals MFA codes pixel-by-pixel
14
Oct
2025

New Android Pixnapping attack steals MFA codes pixel-by-pixel

A new side-channel attack called Pixnapping enables a malicious Android app with no permissions to extract sensitive data by stealing…