ScreenConnect Abused by Threat Actors to Gain Unauthorized Remote Access to Your Computer
14
Oct
2025

ScreenConnect Abused by Threat Actors to Gain Unauthorized Remote Access to Your Computer

Remote monitoring and management (RMM) tools have long served as indispensable assets for IT administrators, providing seamless remote control, unattended…

SAP NetWeaver Memory Corruption Flaw Lets Attackers Send Corrupted Logon Tickets
14
Oct
2025

SAP NetWeaver Memory Corruption Flaw Lets Attackers Send Corrupted Logon Tickets

A newly disclosed vulnerability in SAP NetWeaver AS ABAP and ABAP Platform (CVE-2025-42902) allows unauthenticated attackers to crash server processes…

How Top SOCs Stay Up-to-Date on Current Threat Landscape
14
Oct
2025

How Top SOCs Stay Up-to-Date on Current Threat Landscape

The cyber-threat landscape changes hourly. Infrastructure used in phishing, malware delivery, and command-and-control campaigns appears and disappears within minutes. For…

SimonMed Data Breach Exposes 1.2 Million Patients Sensitive Information
14
Oct
2025

SimonMed Data Breach Exposes 1.2 Million Patients Sensitive Information

SimonMed Imaging, a leading U.S. provider of outpatient medical imaging services, has disclosed a major cybersecurity incident that compromised the…

Hackers Mimic as OpenAI and Sora Services to Steal Login Credentials
14
Oct
2025

Hackers Mimic as OpenAI and Sora Services to Steal Login Credentials

Hackers have launched a sophisticated phishing campaign impersonating both OpenAI and the recently released Sora 2 AI service. By cloning…

Astaroth Trojan Uses GitHub Images to Stay Active After Takedowns
14
Oct
2025

Astaroth Trojan Uses GitHub Images to Stay Active After Takedowns

A new report from McAfee Labs reveals that a dangerous banking trojan, Astaroth, is being distributed with a worrying new…

Vox pop: Digital transformation across the Arab world
14
Oct
2025

Vox pop: Digital transformation across the Arab world

The Middle East region is massively varied when it comes to readiness for digital transformation. Many states – notably those…

North Korean IT Workers Use VPNs and Laptop Farms to Evade Identity Verification
14
Oct
2025

North Korean IT Workers Use VPNs and Laptop Farms to Evade Identity Verification

In a sprawling network of covert remote labor, more than 10,000 North Korean IT professionals have infiltrated global technology and…

Critical CVE-2025-61927 VM Context Escape In Happy DOM Library
14
Oct
2025

Critical CVE-2025-61927 VM Context Escape In Happy DOM Library

A critical security flaw has been identified in Happy DOM, a widely used JavaScript library primarily employed for server-side rendering…

Unverified COTS hardware enables persistent attacks in small satellites via SpyChain
14
Oct
2025

Unverified COTS hardware enables persistent attacks in small satellites via SpyChain

Unverified COTS hardware enables persistent attacks in small satellites via SpyChain Pierluigi Paganini October 14, 2025 SpyChain shows how unverified…

Derek B. Johnson
14
Oct
2025

Red, Blue, and Now AI: Rethinking Cybersecurity Training for the 2026 Threat Landscape

Cybersecurity today is defined by complexity. Threats evolve in real time, driven by AI-generated malware, autonomous reconnaissance, and adversaries capable…

SimonMed Data Breach Exposes Sensitive Information of 1.2 Million Patients
14
Oct
2025

SimonMed Data Breach Exposes Sensitive Information of 1.2 Million Patients

SimonMed Imaging has confirmed that an external hacking incident compromised the personal data of 1,275,669 patients, making it one of…