Saudi Arabia struggling to reach global leadership in deeptech
29
Oct
2025

Saudi Arabia partners with Humain and Qualcomm to power next global AI frontier

Ahead of the ninth edition of the Future Investment Initiative in Riyadh, Saudi Arabia, Humain and Qualcomm Technologies announced a…

Business Logic Abuse — Exploiting the Rules of the Game — API Security
29
Oct
2025

Business Logic Abuse — Exploiting the Rules of the Game — API Security

As Cybersecurity Awareness Month continues, we wanted to dive even deeper into the attack methods affecting APIs. We’ve already reviewed…

New Beast Ransomware Actively Scans for Active SMB Port from Breached System to Spread Across Network
29
Oct
2025

New Beast Ransomware Actively Scans for Active SMB Port from Breached System to Spread Across Network

The Beast ransomware group has emerged as a significant threat in the cybersecurity landscape, evolving from the Monster ransomware strain…

Massive Tata Motors Data Leak Exposes 70+ TB of Sensitive Information
29
Oct
2025

Massive Tata Motors Data Leak Exposes 70+ TB of Sensitive Information

Tata Motors, India’s largest automaker and a major player in the global automotive industry, suffered a catastrophic data exposure that…

Saudi Arabia launches AI health coach to transform preventive care
29
Oct
2025

Saudi Arabia launches AI health coach to transform preventive care

Saudi Arabia’s push to transform its healthcare system has taken a bold technological leap. The Ministry of Health (MoH), in…

CISA Warns of Dassault Systèmes Vulnerabilities Actively Exploited in Attacks
29
Oct
2025

CISA Warns of Dassault Systèmes Vulnerabilities Actively Exploited in Attacks

CISA has added two critical vulnerabilities affecting Dassault Systèmes DELMIA Apriso to its Known Exploited Vulnerabilities catalog, warning that threat…

Docker Compose Flaw Lets Attackers Overwrite Arbitrary Files
29
Oct
2025

Docker Compose Flaw Lets Attackers Overwrite Arbitrary Files

A path traversal vulnerability discovered in Docker Compose allows attackers to write arbitrary files to host systems through specially crafted…

10 npm Packages Caught Stealing Developer Credentials on Windows, macOS, and Linux
29
Oct
2025

10 npm Packages Caught Stealing Developer Credentials on Windows, macOS, and Linux

Oct 29, 2025Ravie LakshmananMalware / Threat Intelligence Cybersecurity researchers have discovered a set of 10 malicious npm packages that are…

Hackers Allegedly Claim Breach Of HSBC USA Customers' Records Including Financial Details
29
Oct
2025

Hackers Allegedly Claim Breach Of HSBC USA Customers’ Records Including Financial Details

A threat actor has claimed responsibility for breaching HSBC USA, alleging possession of a vast database containing sensitive customer personal…

10 NPM Packages That Automatically Run on Install and Steal Credentials
29
Oct
2025

10 NPM Packages That Automatically Run on Install and Steal Credentials

A sophisticated supply chain attack involving ten malicious npm packages that execute automatically upon installation and deploy a comprehensive credential…

Privado.ai introduces AI agents to automate privacy assessments and real-time data mapping
29
Oct
2025

Privado.ai introduces AI agents to automate privacy assessments and real-time data mapping

Privado.ai released several new capabilities to automate privacy assessments and data maps for privacy teams amid growing privacy enforcement for…

U.S. CISA adds Dassault Systèmes DELMIA Apriso flaws to its Known Exploited Vulnerabilities catalog
29
Oct
2025

U.S. CISA adds Dassault Systèmes DELMIA Apriso flaws to its Known Exploited Vulnerabilities catalog

U.S. CISA adds Dassault Systèmes DELMIA Apriso flaws to its Known Exploited Vulnerabilities catalog Pierluigi Paganini October 29, 2025 U.S….