New Mic-E-Mouse Attack Let Hackers Exfiltrate Sensitive Data by Exploiting Mouse Sensors
07
Oct
2025

New Mic-E-Mouse Attack Let Hackers Exfiltrate Sensitive Data by Exploiting Mouse Sensors

A novel and alarming cybersecurity threat has emerged, turning an ordinary computer peripheral into a sophisticated eavesdropping device. Researchers have…

Cavalry Werewolf APT Targets Russian Organizations Using FoalShell and Telegram C2
07
Oct
2025

Cavalry Werewolf APT Targets Russian Organizations Using FoalShell and Telegram C2

Cavalry Werewolf, a Russian-focused advanced persistent threat (APT) cluster, has intensified its offensive operations by experimenting with new malware variants…

Redis patches critical "RediShell" RCE vulnerability, update ASAP! (CVE-2025-49844)
07
Oct
2025

Redis patches critical “RediShell” RCE vulnerability, update ASAP! (CVE-2025-49844)

Redis, the company behind the widely used in-memory data structure store of the same name, has released patches for a…

CISOs: Don't block AI, but adopt it with eyes wide open
07
Oct
2025

Building resilience in the cloud: Bridging SLA gaps and mitigating risk

Today, enterprises need a robust digital infrastructure for everything from customer engagement to operational continuity, and multi-cloud technology has become…

MIND Raises $30 Million for Data Loss Prevention
07
Oct
2025

Hackers Stole Data From Public Safety Comms Firm BK Technologies

Florida-based public safety communications solutions provider BK Technologies Corp (BKTI:NYSE American) revealed on Monday that its IT systems were hacked…

The future of pentesting is Human x AI, and it's already in Burp Suite Professional | Blog
07
Oct
2025

The future of pentesting is Human x AI, and it’s already in Burp Suite Professional | Blog

Andrzej Matykiewicz | 07 October 2025 at 13:17 UTC The latest Hacker-Powered Security Report from HackerOne makes one thing clear:…

Google
07
Oct
2025

Google’s new AI bug bounty program pays up to $30,000 for flaws

This week, Google has launched an AI Vulnerability Reward Program dedicated to security researchers who find and report flaws in…

CrowdStrike Warns of New Mass Exploitation Campaign Leveraging Oracle E-Business Suite 0-Day
07
Oct
2025

CrowdStrike Warns of New Mass Exploitation Campaign Leveraging Oracle E-Business Suite 0-Day

A widespread campaign observed exploiting a novel zero-day vulnerability in Oracle E-Business Suite (EBS) applications, now tracked as CVE-2025-61882.  First…

CISA Alerts on Oracle E-Business Suite 0-Day Actively Exploited for Ransomware Attacks
07
Oct
2025

CISA Alerts on Oracle E-Business Suite 0-Day Actively Exploited for Ransomware Attacks

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert regarding a critical zero-day vulnerability in Oracle E-Business…

Top 50 Cybersecurity Influencers to Follow in 2025
07
Oct
2025

Is The CISO Chair Becoming A Revolving Door?

CISO tenures average just 18 to 26 months, compared with nearly five years for the broader C-suite, according to the…

XWorm 6.0
07
Oct
2025

XWorm 6.0 Returns with 35+ Plugins and Enhanced Data Theft Capabilities

Cybersecurity researchers have charted the evolution of XWorm malware, turning it into a versatile tool for supporting a wide range…

Peer demands Fujitsu pay £700m in interim as it prepares response to Post Office scandal inquiry
07
Oct
2025

Peer demands Fujitsu pay £700m in interim as it prepares response to Post Office scandal inquiry

Fujitsu will respond to the Post Office statutory public inquiry’s part 1 report by Friday this week, with details of…