TEE.Fail attack breaks confidential computing on Intel, AMD, NVIDIA CPUs
28
Oct
2025

TEE.Fail attack breaks confidential computing on Intel, AMD, NVIDIA CPUs

Academic researchers developed a side-channel attack called TEE.Fail, which allows extracting secrets from the trusted execution environment in the CPU, the…

BlueNoroff Hackers Adopts New Infiltration Strategies To Attack C-Level Executives, and Managers
28
Oct
2025

BlueNoroff Hackers Adopts New Infiltration Strategies To Attack C-Level Executives, and Managers

The BlueNoroff threat group, also tracked as Sapphire Sleet, APT38, and TA444, has significantly evolved its targeting capabilities with sophisticated…

PoC code drops for remotely exploitable BIND 9 DNS flaw (CVE-2025-40778)
28
Oct
2025

PoC code drops for remotely exploitable BIND 9 DNS flaw (CVE-2025-40778)

A high-severity vulnerability (CVE-2025-40778) affecting BIND 9 DNS resolvers could be leveraged by remote, unauthenticated attackers to manipulate DNS entries…

UK citizens raise red flags over environmental impacts of datacentres in poll
28
Oct
2025

UK citizens raise red flags over environmental impacts of datacentres in poll

More than three-quarters (78%) of UK consumers are of the view that new datacentres should only be built if the…

Exclusive: OpenAI’s Atlas browser — and others — can be tricked by manipulated web content
28
Oct
2025

Exclusive: OpenAI’s Atlas browser — and others — can be tricked by manipulated web content

As AI browser agents enter the market promising to help people shop, hire employees  or assist with other online tasks,…

Google Chrome
28
Oct
2025

Google Chrome to warn users before opening insecure HTTP sites

Google announced today that the Chrome web browser will start warning users by default before connecting to insecure HTTP public…

Mozilla Wants All New Firefox Extensions to Disclose Data Collection Policies
28
Oct
2025

Mozilla Wants All New Firefox Extensions to Disclose Data Collection Policies

Mozilla is implementing a significant transparency requirement for Firefox extensions, mandating that all new browser add-ons disclose their data collection…

GhostCall and GhostHire
28
Oct
2025

Researchers Expose GhostCall and GhostHire: BlueNoroff’s New Malware Chains

Threat actors tied to North Korea have been observed targeting the Web3 and blockchain sectors as part of twin campaigns…

Alan Turing Institute refocuses on security following Peter Kyle intervention
28
Oct
2025

Alan Turing Institute refocuses on security following Peter Kyle intervention

The Alan Turing Institute (ATI) has begun a significant organisational transformation, which will see it pivot towards major challenges in…

Europol Calls For Solutions To Caller ID Spoofing
28
Oct
2025

Europol Calls For Solutions To Caller ID Spoofing

Caller ID spoofing causes nearly $1 billion (EUR 850 million) in financial losses from fraud and scams each year, according…

Microsoft leads international takedown of Lumma Stealer
28
Oct
2025

Google probes exploitation of critical Windows service CVE

Google Threat Intelligence Group is investigating a series of attacks linked to a hacker targeting a critical vulnerability in Windows…

How Threat Intelligence Feeds Help Organizations Quickly Mitigate Malware Attacks
28
Oct
2025

How Threat Intelligence Feeds Help Organizations Quickly Mitigate Malware Attacks

Organizations today face constant threats from malware, including ransomware, phishing attacks, and zero-day exploits. These threats are evolving faster than…