Akira ransomware: From SonicWall VPN login to encryption in under four hours
29
Sep
2025

Akira ransomware: From SonicWall VPN login to encryption in under four hours

Four hours or less: that’s how long it takes for Akira affiliates to break into organizations and deploy the ransomware…

Amazon Prime logo
29
Sep
2025

Amazon pays $2.5B settlement over deceptive Prime subscriptions

Another day, another settlement. Amazon has settled a lawsuit filed by the Federal Trade Commission (FTC) over misleading customers who…

JLR tentatively restarts production, following £1.5bn government backing
29
Sep
2025

JLR tentatively restarts production, following £1.5bn government backing

Jaguar Land Rover (JLR) plans to resume some of its car-making over the next few days, in the wake of…

Intruder AI
29
Sep
2025

Can We Trust AI To Write Vulnerability Checks? Here’s What We Found

Vulnerability management is always a race. Attackers move quickly, scans take time, and if your scanner can’t keep up, you’re…

SVG Security Analysis Toolkit to Detect Malicious Scripts Hidden in SVG files
29
Sep
2025

SVG Security Analysis Toolkit to Detect Malicious Scripts Hidden in SVG files

As attackers increasingly leverage Scalable Vector Graphics (SVG) for stealthy code injection, security researchers face mounting challenges in detecting obfuscated…

Inside the Mind of a Threat Actor: What CISOs Must Learn Before the Next Breach
29
Sep
2025

Inside the Mind of a Threat Actor: What CISOs Must Learn Before the Next Breach

Cybersecurity isn’t a game of defense—it’s a game of anticipation. Yet too many CISOs and security leaders still think in…

WhatsApp 0-Click Flaw Abused via Malicious DNG Image File
29
Sep
2025

WhatsApp 0-Click Flaw Abused via Malicious DNG Image File

A newly discovered zero-click remote code execution (RCE) vulnerability in WhatsApp is putting millions of Apple users at risk. Researchers from DarkNavyOrg…

RmoteCOM stalkerware
29
Sep
2025

Sex offenders, terrorists, drug dealers, exposed in spyware breach

We’ve covered spyware and stalkerware leaks many times before, but we don’t often see such exposure in software used by…

CISOs: Don't block AI, but adopt it with eyes wide open
29
Sep
2025

Why SLA gaps should not hinder cloud innovation

As cloud adoption accelerates, organisations rely on Service Level Agreements (SLAs) to define expectations around availability, security, and performance, to…

Harrods
29
Sep
2025

Harrods suffers new data breach exposing 430,000 customer records

UK retail giant Harrods has disclosed a new cybersecurity incident after hackers compromised a third-party supplier and stole 430,000 records…

New Spear-Phishing Attack Delivers DarkCloud Malware to Steal Keystrokes, FTP Credentials and Others
29
Sep
2025

New Spear-Phishing Attack Delivers DarkCloud Malware to Steal Keystrokes, FTP Credentials and Others

A newly observed spear-phishing campaign is leveraging sophisticated social engineering lures to distribute DarkCloud, a modular malware suite designed to…

New Spear-Phishing Attack Deploys DarkCloud Malware to Steal Keystrokes and Credentials
29
Sep
2025

New Spear-Phishing Attack Deploys DarkCloud Malware to Steal Keystrokes and Credentials

Adversaries don’t work 9–5 and neither do we. At eSentire, our 24/7 SOCs are staffed with elite threat hunters and…