Top 50 Cybersecurity Influencers to Follow in 2025
07
Oct
2025

Is The CISO Chair Becoming A Revolving Door?

CISO tenures average just 18 to 26 months, compared with nearly five years for the broader C-suite, according to the…

XWorm 6.0
07
Oct
2025

XWorm 6.0 Returns with 35+ Plugins and Enhanced Data Theft Capabilities

Cybersecurity researchers have charted the evolution of XWorm malware, turning it into a versatile tool for supporting a wide range…

Peer demands Fujitsu pay £700m in interim as it prepares response to Post Office scandal inquiry
07
Oct
2025

Peer demands Fujitsu pay £700m in interim as it prepares response to Post Office scandal inquiry

Fujitsu will respond to the Post Office statutory public inquiry’s part 1 report by Friday this week, with details of…

Redis, Lua, Redis Flaw, Wiz, Researchers, Wiz Researchers
07
Oct
2025

Researchers Uncover 13-Yr-Old Redis Flaw Impacting 330,000 Instances

Researchers have uncovered a 13-year-old critical remote-code-execution flaw in Redis that let attackers escape the product’s Lua sandbox and execute…

Threat Actors Behind WARMCOOKIE Malware Added New Features to It’s Arsenal
07
Oct
2025

Threat Actors Behind WARMCOOKIE Malware Added New Features to It’s Arsenal

The WARMCOOKIE backdoor first surfaced in mid-2024, delivered primarily via recruiting-themed phishing campaigns that coaxed victims into executing malicious documents….

Kibana CrowdStrike Connector Flaw Exposes Sensitive Credentials
07
Oct
2025

Kibana CrowdStrike Connector Flaw Exposes Sensitive Credentials

A security issue in the Kibana CrowdStrike Connector allows attackers to access stored CrowdStrike credentials. The flaw affects multiple versions…

OPSWAT’s MetaDefender Drive delivers portable, network-free threat scanning
07
Oct
2025

OPSWAT’s MetaDefender Drive delivers portable, network-free threat scanning

OPSWAT launched MetaDefender Drive with Smart Touch, a portable cybersecurity device designed for malware and compliance scanning of transient cyber…

AI Is Already the #1 Data Exfiltration Channel in the Enterprise
07
Oct
2025

AI Is Already the #1 Data Exfiltration Channel in the Enterprise

For years, security leaders have treated artificial intelligence as an “emerging” technology, something to keep an eye on but not…

HMRC’s hunt for hyperscaler to lead £500m datacentre exit project deemed ‘anti-competitive’
07
Oct
2025

IR35: Conservative Party pledge to reform off-payroll rules gets lacklustre response

A pledge by the shadow home secretary, Andrew Griffith, to “look again” at reforming the controversial IR35 disguised employment legislation…

2025 cybersecurity M&A
07
Oct
2025

Cybersecurity M&A Roundup: 40 Deals Announced in September 2025

Forty cybersecurity merger and acquisition (M&A) deals were announced in September 2025. An analysis conducted by SecurityWeek shows that 405…

Cisco ASA/FTD 0-Day Vulnerability Exploited for Authentication Bypass
07
Oct
2025

Cisco ASA/FTD 0-Day Vulnerability Exploited for Authentication Bypass

Cisco has released advisories for a zero-day exploit chain affecting its Secure Firewall Adaptive Security Appliance (ASA) and Secure Firewall…

Red Hat Breach Impacts 5,000+ High-Value Enterprise Customers, Data at Risk
07
Oct
2025

Red Hat Breach Impacts 5,000+ High-Value Enterprise Customers, Data at Risk

An extortion group calling itself Crimson Collective claimed responsibility for a major breach at Red Hat Consulting. With only 22…