Apple addressed the seventh actively exploited zero-day
01
Oct
2025

Apple urges users to update iPhone and Mac to patch font bug

Apple urges users to update iPhone and Mac to patch font bug Pierluigi Paganini October 01, 2025 Apple released iOS…

Red Hat Openshift AI Service Vulnerability Allow Attackers to Take Control of the Infrastructure
01
Oct
2025

Red Hat Openshift AI Service Vulnerability Allow Attackers to Take Control of the Infrastructure

Red Hat published security advisory CVE-2025-10725, detailing an Important severity flaw in the OpenShift AI Service that could enable low-privileged…

New DNS Malware 'Detour Dog' Uses TXT Records to Deliver Strela Stealer
01
Oct
2025

New DNS Malware ‘Detour Dog’ Uses TXT Records to Deliver Strela Stealer

Detour Dog, a stealthy website malware campaign tracked since August 2023, has evolved from redirecting victims to tech-support scams into…

Too many Cisco ASA firewalls still unsecure despite zero-day attack alerts
01
Oct
2025

Too many Cisco ASA firewalls still unsecure despite zero-day attack alerts

Despite Cisco and various cybersecurity agencies warning about attackers actively exploting zero-day vulnerabilities (CVE-2025-20333 and CVE-2025-20362) in Cisco Adaptive Security…

North Wales Police pilots hybrid quantum emergency response
01
Oct
2025

North Wales Police pilots hybrid quantum emergency response

North Wales Police (NWP) has worked with D-Wave on a proof-of-concept hybrid quantum computing application to optimise the placement of…

CMMC is coming, but most contractors still have a long road to full compliance
01
Oct
2025

CMMC is coming, but most contractors still have a long road to full compliance

Listen to the article 3 min This audio is auto-generated. Please let us know if you have feedback. Dive Brief:…

New Chinese Nexus APT Hackers Attacking Organizations to Deliver NET-STAR Malware Suite
01
Oct
2025

New Chinese Nexus APT Hackers Attacking Organizations to Deliver NET-STAR Malware Suite

In recent weeks, security teams worldwide have observed a surge in covert operations orchestrated by a clandestine group known colloquially…

Android Banking Trojan
01
Oct
2025

New Android Banking Trojan “Klopatra” Uses Hidden VNC to Control Infected Smartphones

A previously undocumented Android banking trojan called Klopatra has compromised over 3,000 devices, with a majority of the infections reported…

SendIt, Children's Privacy, Online Privacy, Children's Online Privacy, COPPA
01
Oct
2025

FTC Sues Sendit App, CEO Over Illegal Children’s Data Collection

The Federal Trade Commission (FTC) has filed a complaint against social app Sendit and its CEO Hunter Rice, alleging that…

VMware vulnerability
01
Oct
2025

Broadcom Fails to Disclose Zero-Day Exploitation of VMware Vulnerability

A newly patched high-severity VMware vulnerability has been exploited as a zero-day since October 2024 for code execution with elevated…

Hackers Exploit Cellular Router’s API to Send Malicious SMS Messages With Weaponized Links
01
Oct
2025

Hackers Exploit Cellular Router’s API to Send Malicious SMS Messages With Weaponized Links

Hackers have recently leveraged a vulnerability in the web-based management interfaces of certain cellular routers to co-opt their built-in SMS…

Battering RAM Exploit Bypasses Modern Protections in Intel, AMD Cloud Processors
01
Oct
2025

Battering RAM Exploit Bypasses Modern Protections in Intel, AMD Cloud Processors

Cloud providers rely on hardware-based memory encryption to keep user data safe. This encryption shields sensitive information like passwords, financial…