Home Affairs streamlines risk vetting for gov tech suppliers
28
Oct
2025

Home Affairs streamlines risk vetting for gov tech suppliers

Home Affairs is streamlining its security vetting procedures for Commonwealth technology suppliers, but there is a quid pro quo for…

CISA
28
Oct
2025

CISA warns of two more actively exploited Dassault vulnerabilities

The Cybersecurity & Infrastructure Security Agency (CISA) warned today that attackers are actively exploiting two vulnerabilities in Dassault Systèmes’ DELMIA…

New TEE.Fail Side-Channel Attack Extracts Secrets from Intel and AMD DDR5 Secure Enclaves
28
Oct
2025

New TEE.Fail Side-Channel Attack Extracts Secrets from Intel and AMD DDR5 Secure Enclaves

Oct 28, 2025Ravie LakshmananEncryption / Hardware Security A group of academic researchers from Georgia Tech, Purdue University, and Synkhronix have…

UK Afghan Data Leak Linked To 49 Deaths
28
Oct
2025

UK Afghan Data Leak Linked To 49 Deaths

A new study that looked at 231 people exposed by a 2022 UK data leak of Afghans seeking resettlement after…

Google's Tabua cable to be covered by extended Sydney protection zone
28
Oct
2025

Google’s Tabua cable to be covered by extended Sydney protection zone

Google’s Tabua submarine cable will now land in a designated protection zone in Sydney’s south after the communications regulator agreed…

Linux
28
Oct
2025

Qilin ransomware abuses WSL to run Linux encryptors in Windows

The Qilin ransomware operation was spotted executing Linux encryptors in Windows using Windows Subsystem for Linux (WSL) to evade detection…

New GhostGrab Android Malware Silently Steals Banking Login Details and Intercept SMS for OTPs
28
Oct
2025

New GhostGrab Android Malware Silently Steals Banking Login Details and Intercept SMS for OTPs

A sophisticated Android banking trojan dubbed GhostGrab has emerged in the threat landscape, targeting financial institutions across multiple regions with…

28
Oct
2025

Copilot now lets you build apps, automate workflows

​Microsoft announced today a new Microsoft 365 Copilot agent called App Builder that can help users create and deploy apps…

XWiki RCE Vulnerability Actively Exploted In Wild To Deliver Coinminer
28
Oct
2025

XWiki RCE Vulnerability Actively Exploted In Wild To Deliver Coinminer

A critical remote code execution (RCE) flaw in XWiki, a popular open-source wiki platform, was exploited in the wild to…

us-teen-indicted-764-network-case-crimes
28
Oct
2025

US Teen Indicted in 764 Network Case Involving Exploitation Crimes – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More

A 19-year-old man from Porterville, California, has been indicted for his alleged role in the extremist network known as “764,”…

Android Trojan
28
Oct
2025

New Android Trojan ‘Herodotus’ Outsmarts Anti-Fraud Systems by Typing Like a Human

Oct 28, 2025Ravie LakshmananMalware / Mobile Security Cybersecurity researchers have disclosed details of a new Android banking trojan called Herodotus…

TEE.Fail attack breaks confidential computing on Intel, AMD, NVIDIA CPUs
28
Oct
2025

TEE.Fail attack breaks confidential computing on Intel, AMD, NVIDIA CPUs

Academic researchers developed a side-channel attack called TEE.Fail, which allows extracting secrets from the trusted execution environment in the CPU, the…