48+ Cisco Firewalls Vulnerable to Actively Exploited 0-Day Vulnerability in the Wild
01
Oct
2025

48+ Cisco Firewalls Vulnerable to Actively Exploited 0-Day Vulnerability in the Wild

A critical zero-day vulnerability affecting thousands of Cisco firewalls is being actively exploited by threat actors in the wild.  The…

Google Publishes Security Hardening Guide to Counter UNC6040 Threats
01
Oct
2025

Google Publishes Security Hardening Guide to Counter UNC6040 Threats

Google’s Threat Intelligence Group (GTIG) has published a comprehensive guide to help organizations strengthen their SaaS security posture—particularly Salesforce—against UC6040’s…

WestJet confirms cyberattack exposed IDs, passports in June incident
01
Oct
2025

WestJet confirms cyberattack exposed IDs, passports in June incident

WestJet confirms cyberattack exposed IDs, passports in June incident Pierluigi Paganini October 01, 2025 WestJet confirms June cyberattack that disrupted…

Cisco IOS/IOS XE SNMP Vulnerabilities Exploited in Ongoing Attacks, Warns CISA
01
Oct
2025

Cisco IOS/IOS XE SNMP Vulnerabilities Exploited in Ongoing Attacks, Warns CISA

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning about critical vulnerabilities in Cisco’s IOS and IOS XE…

Biometric spoofing isn’t as complex as it sounds
01
Oct
2025

Biometric spoofing isn’t as complex as it sounds

Biometric technologies were originally designed to improve security and streamline authentication, but they’re often misused in ways most people don’t…

OpenSSL Vulnerabilities Let Attackers Execute Malicious Code and Recover Private Key Remotely
01
Oct
2025

OpenSSL Vulnerabilities Let Attackers Execute Malicious Code and Recover Private Key Remotely

The OpenSSL Project has released a critical security advisory, addressing three significant vulnerabilities that could allow attackers to execute remote…

Microsoft Sentinel Launches AI-Driven Agentic SIEM Platform for Enterprise Security
01
Oct
2025

Microsoft Sentinel Launches AI-Driven Agentic SIEM Platform for Enterprise Security

Organizations face an ever-evolving cyberthreat landscape marked by faster, more complex attacks. Today, Microsoft is answering this call with the…

Hackers love LOTL, this approach shuts them down
01
Oct
2025

Hackers love LOTL, this approach shuts them down

Every time cyber defenders and companies discover new ways to block intrusions, attackers change their tactics and find a way…

Beware! Threat Actors Distributing Malicious AI Tools as Chrome Extensions
01
Oct
2025

Beware! Threat Actors Distributing Malicious AI Tools as Chrome Extensions

A concerning cybersecurity trend has emerged as threat actors exploit the growing popularity of artificial intelligence tools by distributing malicious…

MatrixPDF Campaign Evades Gmail Filters to Deliver Malicious Payloads
01
Oct
2025

MatrixPDF Campaign Evades Gmail Filters to Deliver Malicious Payloads

Cybercriminals are turning a trusted file format against users in a sophisticated new attack campaign. MatrixPDF represents a concerning evolution…

A2AS framework targets prompt injection and agentic AI security risks
01
Oct
2025

A2AS framework targets prompt injection and agentic AI security risks

AI systems are now deeply embedded in business operations, and this introduces new security risks that traditional controls are not…

Ransomware remains the leading cause of costly cyber claims
01
Oct
2025

Ransomware remains the leading cause of costly cyber claims

Cyber threats are shifting in 2025, and while large companies are still targets, attackers are turning their attention to smaller…