active seniors
02
Oct
2025

Scam Facebook groups send malicious Android malware to seniors

An infostealer and banking Trojan rolled into one is making the rounds in Facebook groups aimed at “active seniors”. Attackers…

Malicious PyPI Package
02
Oct
2025

Malicious PyPI Package soopsocks Infects 2,653 Systems Before Takedown

Oct 02, 2025Ravie LakshmananPython / Malware Cybersecurity researchers have flagged a malicious package on the Python Package Index (PyPI) repository…

Interview: Amanda Stent, head of AI strategy and research, Bloomberg
02
Oct
2025

Aston University partners Capgemini for AI centre of excellence

Aston University has opened a centre of excellence to bring together businesses, academia and policy-makers to support the adoption of…

Google Patches “Gemini Trifecta” Vulnerabilities in Gemini AI Suite
02
Oct
2025

Google Patches “Gemini Trifecta” Vulnerabilities in Gemini AI Suite

Cybersecurity researchers at Tenable recently discovered three critical security flaws within Google’s Gemini AI assistant suite, which they’ve dubbed “Gemini…

Oracle customers targeted with emails claiming E-Business Suite breach, data theft
02
Oct
2025

Oracle customers targeted with emails claiming E-Business Suite breach, data theft

Unknown attackers claiming affiliation with the Cl0p extortion gang are hitting business and IT executives at various companies with emails…

Google Mandiant Probes New Oracle Extortion Wave Possibly Linked to Cl0p Ransomware
02
Oct
2025

Google Mandiant Probes New Oracle Extortion Wave Possibly Linked to Cl0p Ransomware

Oct 02, 2025Ravie LakshmananRansomware / Threat Intelligence Google Mandiant and Google Threat Intelligence Group (GTIG) have disclosed that they are…

Intel security
02
Oct
2025

WireTap Attack Breaks Intel SGX Security

A group of academic researchers from Georgia Tech and Purdue University has demonstrated that a passive DIMM interposer can be…

Rethinking NHI Security: The Essential Shift to Zero Trust Security and Ephemeral Identities
02
Oct
2025

Rethinking NHI Security: The Essential Shift to Zero Trust Security and Ephemeral Identities

As identity security becomes increasingly critical in cybersecurity, the focus has shifted from safeguarding human identities to protecting Non-Human Identities (NHIs)—such…

Redefining Cybersecurity In The Age Of Autonomous Agents
02
Oct
2025

Sophos: Defeat Cyberattacks With Cybersecurity-as-a-Service

CEO Joe Levy explains how Sophos defeats cyberattacks with an adaptive AI-native open platform and unmatched security expertise in a new video on the…

7 Key Workflows for Maximum Impact
02
Oct
2025

7 Key Workflows for Maximum Impact

Penetration testing is critical to uncovering real-world security weaknesses. With the shift into continuous testing and validation, it is time…

WestJet data breach
02
Oct
2025

1.2 Million Impacted by WestJet Data Breach

Canadian airline WestJet is notifying roughly 1.2 million people that their personal information was stolen in a June 2025 cyberattack….

Regional booster programme aims to drive UK tech growth
02
Oct
2025

Regional booster programme aims to drive UK tech growth

The government has unveiled 14 Regional Tech Booster projects as part of its £1m programme to provide businesses and entrepreneurs…