7 Key Workflows for Maximum Impact
02
Oct
2025

7 Key Workflows for Maximum Impact

Penetration testing is critical to uncovering real-world security weaknesses. With the shift into continuous testing and validation, it is time…

WestJet data breach
02
Oct
2025

1.2 Million Impacted by WestJet Data Breach

Canadian airline WestJet is notifying roughly 1.2 million people that their personal information was stolen in a June 2025 cyberattack….

Regional booster programme aims to drive UK tech growth
02
Oct
2025

Regional booster programme aims to drive UK tech growth

The government has unveiled 14 Regional Tech Booster projects as part of its £1m programme to provide businesses and entrepreneurs…

MIND Raises $30 Million for Data Loss Prevention
02
Oct
2025

766,000 Impacted by Data Breach at Dealership Software Provider Motility

Dealership software company Motility Software Solutions is notifying over 766,000 people that their personal information was compromised in a ransomware…

Red Hat logo
02
Oct
2025

Red Hat confirms security incident after hackers claim GitHub breach

An extortion group calling itself the Crimson Collective claims to have breached Red Hat’s private GitHub repositories, stealing nearly 570GB…

How to Close Threat Detection Gaps: Your SOC's Action Plan
02
Oct
2025

How to Close Threat Detection Gaps: Your SOC’s Action Plan

Running a SOC often feels like drowning in alerts. Every morning, dashboards light up with thousands of signals; some urgent,…

Cybercrime group claims to have breached Red Hat 's private GitHub repositories
02
Oct
2025

Cybercrime group claims to have breached Red Hat ‘s private GitHub repositories

Cybercrime group claims to have breached Red Hat ‘s private GitHub repositories Pierluigi Paganini October 02, 2025 The cybercrime group…

API Attack Awareness: Broken Object Level Authorization (BOLA)
02
Oct
2025

API Attack Awareness: Broken Object Level Authorization (BOLA)

For this Cybersecurity Awareness Month, we thought it important to draw attention to some of the most common and dangerous…

Android spyware campaigns impersonate Signal and ToTok messengers
02
Oct
2025

Android spyware campaigns impersonate Signal and ToTok messengers

Two new spyware campaigns that researchers call ProSpy and ToSpy lured Android users with fake upgrades or plugins for the…

Malicious ZIP Files Use Windows Shortcuts to Drop Malware
02
Oct
2025

Malicious ZIP Files Use Windows Shortcuts to Drop Malware

A new wave of phishing attacks has been detected by the cybersecurity research firm, Blackpoint Cyber, that is exploiting users’…

Oracle E-Business Suite hack
02
Oct
2025

Cybercriminals Claim Theft of Data From Oracle E-Business Suite Customers

A significant number of organizations have received extortion emails from hackers who claim to have stolen sensitive information from their…

Beware of Android Spyware Disguised as Signal Encryption Plugin and ToTok Pro
02
Oct
2025

Beware of Android Spyware Disguised as Signal Encryption Plugin and ToTok Pro

Cybersecurity researchers have discovered two Android spyware campaigns dubbed ProSpy and ToSpy that impersonate apps like Signal and ToTok to…