The solar power boom opened a backdoor for cybercriminals
14
Oct
2025

The solar power boom opened a backdoor for cybercriminals

Solar isn’t low risk anymore. Adoption has turned inverters, aggregators, and control software into attack surfaces capable of disrupting service…

Pro-Russian Hacktivist Attacking OT/ICS Devices to Steal Login Credentials
14
Oct
2025

Pro-Russian Hacktivist Attacking OT/ICS Devices to Steal Login Credentials

A newly identified pro-Russian hacktivist group has successfully infiltrated operational technology and industrial control systems belonging to critical infrastructure organizations,…

Clevo UEFI Leak Allows Signing of Malicious Firmware with BootGuard Keys
14
Oct
2025

Clevo UEFI Leak Allows Signing of Malicious Firmware with BootGuard Keys

Clevo accidentally exposed private keys used in its Intel Boot Guard implementation, allowing attackers to sign malicious firmware that would…

Security validation: The key to maximizing ROI from security investments
14
Oct
2025

Security validation: The key to maximizing ROI from security investments

Every sizable organization invests heavily in firewalls, SIEMs, EDRs, and countless other technologies that form the backbone of a modern…

Computer Hardware, Electronics, Hardware Ransomware attacks are when a cyber attacker breaches an organisation’s system and locks data or operations, demanding money to restore services
14
Oct
2025

Insider ransomware threats are Mena’s ‘latest oil spill’

15% of MENA businesses have been targeted Ransomware is projected to cost $240 billion annually Data centers are high-value targets…

Australian Government Annual Cyber Threat Report released
14
Oct
2025

High Alert Volume and Downtime Challenge Security Teams

Illumio has released The 2025 Global Cloud Detection and Response Report, based on a global survey of 1,150 cybersecurity leaders,…

Cybersecurity jobs available right now: October 14, 2025
14
Oct
2025

Cybersecurity jobs available right now: October 14, 2025

Cyber Security Analyst I First Citizens Bank | USA | Remote – View job details As a Cyber Security Analyst,…

Ansell has data accessed by unknown attackers
14
Oct
2025

Ansell has data accessed by unknown attackers

Ansell, a maker of personal protective equipment (PPE) like gloves, has disclosed a cyber incident where unknown attackers exploited vulnerabilities…

Australian Government Annual Cyber Threat Report released
14
Oct
2025

Australian Government Annual Cyber Threat Report released

The Australian Signals Directorate’s Australian Cyber Security Centre’s (ASD’s ACSC’s) Annual Cyber Threat Report (ACTR) 2024–25 is now available. The average Australian…

Microsoft restrains exploited legacy IE mode in Edge browser
14
Oct
2025

Microsoft restrains exploited legacy IE mode in Edge browser

Threat actors have worked around the security enhancements in Microsoft’s Edge web browser, by simply using social engineering to tell…

Hackers Can Bypass OpenAI Guardrails Framework Using a Simple Prompt Injection Technique
14
Oct
2025

Hackers Can Bypass OpenAI Guardrails Framework Using a Simple Prompt Injection Technique

OpenAI’s newly launched Guardrails framework, designed to enhance AI safety by detecting harmful behaviors, has been swiftly compromised by researchers…

Banking malware used GitHub for persistence
14
Oct
2025

Banking malware used GitHub for persistence

GitHub has removed malicious code repositories that acted as command and control (C2) infrastructure for a banking information stealer, after…