Zabbix Agent and Agent 2 for Windows Vulnerability Let Attackers Escalate Privileges
06
Oct
2025

Zabbix Agent and Agent 2 for Windows Vulnerability Let Attackers Escalate Privileges

A critical security vulnerability has been discovered in Zabbix Agent and Agent 2 for Windows that allows attackers with local…

TamperedChef Malware Disguised as PDF Editor Hijacks Browser Credentials and Opens Backdoors
06
Oct
2025

TamperedChef Malware Disguised as PDF Editor Hijacks Browser Credentials and Opens Backdoors

A sophisticated malware campaign dubbed TamperedChef has successfully compromised European organizations by masquerading as a legitimate PDF editor application, according…

Cl0p exploits Oracle E-Business Suite zero-day in data theft, extortion campaign (CVE-2025-61882)
06
Oct
2025

Cl0p exploits Oracle E-Business Suite zero-day in data theft, extortion campaign (CVE-2025-61882)

The Cl0p extortion gang exploited multiple Oracle E-Business Suite (EBS) vulnerabilities, including one zero-day flaw (CVE-2025-61882), “to steal large amounts…

Dutch cloud pioneers face the hard limits of digital sovereignty
06
Oct
2025

Enterprise software sales through cloud hyperscale marketplaces set to hit $163bn by 2030

Sales of enterprise software through hyperscale cloud marketplaces hosted by the likes of Amazon Web Services (AWS), Microsoft and Google…

Salesforce data theft extortion
06
Oct
2025

Hackers Extorting Salesforce After Stealing Data From Dozens of Customers

A threat actor supposedly formed of members of known hacking groups has claimed the theft of large amounts of data…

Microsoft Teams Set to Introduce Highly Anticipated Multitasking Functionality
06
Oct
2025

Microsoft Teams Set to Introduce Highly Anticipated Multitasking Functionality

Microsoft is set to roll out a highly anticipated multitasking feature for its Teams platform, which will allow users to…

Integrate Gemini CLI into Your Kali Terminal to Speed Up Pentesting Tasks
06
Oct
2025

Integrate Gemini CLI into Your Kali Terminal to Speed Up Pentesting Tasks

With the release of Kali Linux 2025.3, penetration testers and security professionals gain access to an innovative AI-powered assistant, the…

Facebook icon on a mobile phone screen
06
Oct
2025

How to set up two-factor authentication (2FA) on your Facebook account

While two-factor authentication (2FA) is not completely fool-proof, it is one of the best ways to protect your accounts from…

MIND Raises $30 Million for Data Loss Prevention
06
Oct
2025

Data Breach at Doctors Imaging Group Impacts 171,000 People

Doctors Imaging Group, a radiology practice with locations in Palatka and Gainesville, Florida, is informing customers about a data breach…

Google Chrome RCE Vulnerability Details Released Along with Exploit Code
06
Oct
2025

Google Chrome RCE Vulnerability Details Released Along with Exploit Code

Researchers have published the full technical details and exploit code for a critical remote code execution (RCE) vulnerability in Google…

Vibe Coding Is the New Open Source—in the Worst Way Possible
06
Oct
2025

Vibe Coding Is the New Open Source—in the Worst Way Possible

Just like you probably don’t grow and grind wheat to make flour for your bread, most software developers don’t write…

QNAP NetBak Replicator Vulnerability Allow Malicious Code Execution
06
Oct
2025

QNAP NetBak Replicator Vulnerability Allow Malicious Code Execution

QNAP Systems has disclosed a critical security vulnerability in its NetBak Replicator software that could enable local attackers to execute…