Cl0p-Linked Gang Attempts to Extort Oracle E-Business Customers
03
Oct
2025

Cl0p-Linked Gang Attempts to Extort Oracle E-Business Customers

Cybersecurity experts are on high alert as a group claiming ties to the infamous Cl0p ransomware gang is bombarding companies…

Kido nursery chain logo
03
Oct
2025

From threats to apology, hackers pull child data offline after public backlash

Last week we yelled at some “hackers” that threatened parents after stealing data from their children’s nursery. This followed a…

Interview: Sacha Vaughan, chief supply chain officer, Joseph Joseph
03
Oct
2025

Interview: Sacha Vaughan, chief supply chain officer, Joseph Joseph

Sacha Vaughan, chief supply chain officer at houseware manufacturer Joseph Joseph, is in a fortunate position – her board recognises…

MIND Raises $30 Million for Data Loss Prevention
03
Oct
2025

MokN Raises $3 Million for Phish-Back Solution

French cybersecurity startup MokN today announced raising €2.6 million (~$3 million) for its deception-based identity protection solution. The investment round…

Oracle
03
Oct
2025

Oracle links Clop extortion attacks to July 2025 vulnerabilities

Oracle has linked an ongoing extortion campaign claimed by the Clop ransomware gang to E-Business Suite (EBS) vulnerabilities that were patched…

New XWorm V6 Variant Injects Malicious Code into a Legitimate Windows Program
03
Oct
2025

New XWorm V6 Variant Injects Malicious Code into a Legitimate Windows Program

The resurgence of XWorm in mid-2025 marks a significant escalation in malware sophistication. After a lull following the abrupt discontinuation…

GhostSocks Malware-as-a-Service Turns Compromised Devices into Proxies for Threat Actors
03
Oct
2025

GhostSocks Malware-as-a-Service Turns Compromised Devices into Proxies for Threat Actors

On October 15, 2023, a threat actor using the handle GhostSocks published a sales post on the Russian cybercrime forum…

Enterprise Security
03
Oct
2025

How Passwork 7 Addresses Complexity of Enterprise Security

Passwork is positioned as an on-premises unified platform for both password and secrets management, aiming to address the increasing complexity…

Software engineering limited by lack of full automation
03
Oct
2025

Software engineering limited by lack of full automation

A survey by Coleman Parkes for Harness has found that the use of artificial intelligence (AI) in software development is…

Critical Splunk Vulnerabilities Affect Multiple Versions
03
Oct
2025

Critical Splunk Vulnerabilities Affect Multiple Versions

Splunk has disclosed six critical security vulnerabilities impacting multiple versions of both Splunk Enterprise and Splunk Cloud Platform. These Splunk…

DrayTek router vulnerabilities
03
Oct
2025

Unauthenticated RCE Flaw Patched in DrayTek Routers

DrayTek on Thursday announced patches for an unauthenticated remote code execution (RCE) vulnerability affecting DrayOS routers. Tracked as CVE-2025-10547, the…

Gmail
03
Oct
2025

Gmail business users can now send encrypted emails to anyone

Google says that Gmail enterprise users can now send end-to-end encrypted emails to people who use any email service or…