Derek B. Johnson
14
Oct
2025

Red, Blue, and Now AI: Rethinking Cybersecurity Training for the 2026 Threat Landscape

Cybersecurity today is defined by complexity. Threats evolve in real time, driven by AI-generated malware, autonomous reconnaissance, and adversaries capable…

SimonMed Data Breach Exposes Sensitive Information of 1.2 Million Patients
14
Oct
2025

SimonMed Data Breach Exposes Sensitive Information of 1.2 Million Patients

SimonMed Imaging has confirmed that an external hacking incident compromised the personal data of 1,275,669 patients, making it one of…

Government sets up guidance for 10-year R&D commitment
14
Oct
2025

Khazna leads UAE’s global AI push with massive datacentre expansion

Khazna Data Centers has revealed it will add over 1GW of hyperscale capacity by 2030 across multiple countries. The hosting…

Why API security is different (and why it matters)
14
Oct
2025

Why API security is different (and why it matters)

Two months in at Detectify and I’ve realized something: API security is a completely different game from web application security….

Ivanti Patches 13 Vulnerabilities in Endpoint Manager Allowing Remote Code Execution
14
Oct
2025

Ivanti Patches 13 Vulnerabilities in Endpoint Manager Allowing Remote Code Execution

Ivanti has disclosed 13 vulnerabilities in its Endpoint Manager (EPM) software, including two high-severity flaws that could enable remote code…

Elastic Cloud Enterprise Flaw Lets Attackers Run Malicious Commands
14
Oct
2025

Elastic Cloud Enterprise Flaw Lets Attackers Run Malicious Commands

Elastic has released a critical security update for Elastic Cloud Enterprise (ECE) addressing a template engine injection flaw that could…

MonsterV2 Malware
14
Oct
2025

Researchers Expose TA585’s MonsterV2 Malware Capabilities and Attack Chain

Oct 14, 2025Ravie LakshmananMalware / Social Engineering Cybersecurity researchers have shed light on a previously undocumented threat actor called TA585…

Nexperia Netherlands intervention
14
Oct
2025

Nexperia Faces Dutch Intervention Amid Security Concerns

The Dutch government has invoked the Goods Availability Act (Wet Beschikbaarheid Goederen) to assert control over decisions made by Chinese-owned…

Oracle issued an emergency security update to fix new E-Business Suite flaw CVE-2025-61884
14
Oct
2025

Oracle issued an emergency security update to fix new E-Business Suite flaw CVE-2025-61884

Oracle issued an emergency security update to fix new E-Business Suite flaw CVE-2025-61884 Pierluigi Paganini October 14, 2025 Oracle issued…

New PoC Exploit Released for Sudo Chroot Privilege Escalation Vulnerability
14
Oct
2025

New PoC Exploit Released for Sudo Chroot Privilege Escalation Vulnerability

A critical vulnerability in the widely used Sudo utility has come under scrutiny following the public release of a proof-of-concept…

Threat Actors Exploit ScreenConnect to Gain Unauthorized Remote Access
14
Oct
2025

Threat Actors Exploit ScreenConnect to Gain Unauthorized Remote Access

A recent surge in threat actors leveraging remote management and monitoring (RMM) tools for initial access has intensified scrutiny of…

Gcore Mitigates Record-Breaking 6 Tbps DDoS Attack
14
Oct
2025

Gcore Mitigates Record-Breaking 6 Tbps DDoS Attack

Luxembourg, Luxembourg, October 14th, 2025, CyberNewsWire Surge in scale and sophistication highlights rising threats to tech and digital infrastructure Gcore,…