Cyber attack that downed airport systems confirmed as ransomware
22
Sep
2025

Cyber attack that downed airport systems confirmed as ransomware

The European Union’s ENISA cyber security agency and the UK’s National Cyber Security Centre (NCSC) are among those activating resources…

Stellantis probes data breach linked to third-party provider
22
Sep
2025

Stellantis probes data breach linked to third-party provider

Stellantis probes data breach linked to third-party provider Pierluigi Paganini September 22, 2025 Stellantis is investigating a data breach after…

Stellantis
22
Sep
2025

Automaker giant Stellantis confirms data breach after Salesforce hack

Automotive manufacturing giant Stellantis has confirmed that attackers stole some of its North American customers’ data after gaining access to…

Threat Actors Leverage Oracle Database Scheduler to Gain Access to Corporate Environments
22
Sep
2025

Threat Actors Leverage Oracle Database Scheduler to Gain Access to Corporate Environments

In recent weeks, security researchers have observed a surge in attacks exploiting Oracle Database Scheduler’s External Jobs feature to gain…

Teen charged with Las Vegas casino cyber heist
22
Sep
2025

Teen charged with Las Vegas casino cyber heist

A teenage boy suspected of involvement in the Scattered Spider cyber attacks on two major Las Vegas casino operators, Caesars…

Flights across Europe delayed after cyberattack targets third-party vendor
22
Sep
2025

Flights across Europe delayed after cyberattack targets third-party vendor

A cyberattack targeting a third-party technology vendor has disrupted passenger flights at major international airports across Europe, including Heathrow Airport…

Windows
22
Sep
2025

New EDR-Freeze tool uses Windows WER to suspend security software

A new method and proof-of-concept tool called EDR-Freeze demonstrates that evading security solutions is possible from user mode with Microsoft’s…

New Inboxfuscation Tool That Bypasses Microsoft Exchange Inbox Rules and Evade Detection
22
Sep
2025

New Inboxfuscation Tool That Bypasses Microsoft Exchange Inbox Rules and Evade Detection

Attackers increasingly exploit Microsoft Exchange inbox rules to maintain persistence and exfiltrate data within enterprise environments.  A newly released tool,…

AI-powered vulnerability detection will make things worse, not better, former US cyber official warns
22
Sep
2025

AI-powered vulnerability detection will make things worse, not better, former US cyber official warns

Listen to the article 3 min This audio is auto-generated. Please let us know if you have feedback. WASHINGTON — Cybersecurity…

LastPass: Fake password managers infect Mac users with malware
22
Sep
2025

Fake password managers infect Mac users with malware

LastPass is warning users of a campaign that targets macOS users with malicious software impersonating popular products delivered through fraudulent…

Subtle Snail Mimic as HR Representatives to Engage Employees and Steal Login Credentials
22
Sep
2025

Subtle Snail Mimic as HR Representatives to Engage Employees and Steal Login Credentials

A sophisticated Iran-nexus espionage group known as Subtle Snail has emerged as a significant threat to European telecommunications, aerospace, and…

Bitcoin continues to increase its institutional popularity 
22
Sep
2025

Bitcoin continues to increase its institutional popularity 

Not long ago, the mere idea that cryptocurrencies could ever be integrated into mainstream finance would have seemed like a…