VMware Zero-Day
30
Sep
2025

China-Linked Hackers Exploit New VMware Zero-Day Since October 2024

Sep 30, 2025Ravie LakshmananZero-Day / Vulnerability A newly patched security flaw impacting Broadcom VMware Tools and VMware Aria Operations has…

Infinidat doubles all-flash array capacity in Infinibox SSA G4 F24
30
Sep
2025

Infinidat doubles all-flash array capacity in Infinibox SSA G4 F24

Infinidat has expanded its Infinibox family to double the capacity of its biggest all-flash array while cutting its physical footprint….

Gemini AI hack
30
Sep
2025

Google Patches Gemini AI Hacks Involving Poisoned Logs, Search Results

Several weaknesses patched recently by Google in Gemini could have allowed attackers to trick the AI assistant into helping them…

When Audits Fail: Four Critical Pre-Auth Vulnerabilities in TRUfusion Enterprise
30
Sep
2025

When Audits Fail: Four Critical Pre-Auth Vulnerabilities in TRUfusion Enterprise

In early 2025, we encountered a mission-critical software component called TRUfusion Enterprise on the perimeter of one of our customers…

Cisco firewall flaws endanger nearly 50,000 devices worldwide
30
Sep
2025

Cisco firewall flaws endanger nearly 50,000 devices worldwide

Listen to the article 2 min This audio is auto-generated. Please let us know if you have feedback. Nearly 50,000…

Ali El Kaafarani
30
Sep
2025

Anthropic touts safety, security improvements in Claude Sonnet 4.5

Anthropic’s new coding-focused  large language model, Claude Sonnet 4.5, is being touted as one of the most advanced models on…

Windows
30
Sep
2025

Microsoft fixes Windows DRM video playback issues for some users

Microsoft says it has “partially” resolved a known issue that caused problems when trying to play DRM-protected video in Blu-ray/DVD/Digital…

Google Gemini Vulnerabilities Let Attackers Exfiltrate User’s Saved Data and Location
30
Sep
2025

Google Gemini Vulnerabilities Let Attackers Exfiltrate User’s Saved Data and Location

Three new vulnerabilities in Google’s Gemini AI assistant suite could have allowed attackers to exfiltrate users’ saved information and location…

Hackers Use Cellular Router API to Send Malicious SMS with Weaponized Links
30
Sep
2025

Hackers Use Cellular Router API to Send Malicious SMS with Weaponized Links

The monitoring and analysis of vulnerability exploitations are among the primary responsibilities of Sekoia.io’s Threat Detection & Research (TDR) team….

US Auto Insurance Platform ClaimPix Leaked 10.7TB of Records Online
30
Sep
2025

US Auto Insurance Platform ClaimPix Leaked 10.7TB of Records Online

A massive collection of data belonging to customers of ClaimPix, an Illinois-based platform for managing auto insurance claims across the…

CISA says it will fill the gap as some federal funding for MS-ISAC dries up
30
Sep
2025

CISA says it will fill the gap as some federal funding for MS-ISAC dries up

The cooperative agreement between the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the not-for-profit Center for Internet Security is…

Context Is the Key to Effective Incident Response
30
Sep
2025

Context Is the Key to Effective Incident Response

Sep 30, 2025The Hacker NewsArtificial Intelligence / Threat Detection The Problem: Legacy SOCs and Endless Alert Noise Every SOC leader…