TAG-150 Hackers Escalate Attacks with Proprietary Malware Families
05
Sep
2025

TAG-150 Hackers Escalate Attacks with Proprietary Malware Families

A sophisticated threat actor, TAG-150, active since at least March 2025. Characterized by rapid malware development, technical sophistication, and a…

Scammers Exploit Grok AI With Video Ad Scam to Push Malware on X
05
Sep
2025

Scammers Exploit Grok AI With Video Ad Scam to Push Malware on X

Researchers at Guardio Labs have uncovered a new “Grokking” scam where attackers trick Grok AI into spreading malicious links on…

The Dark Side Of LLMs For Code Generation
05
Sep
2025

The Dark Side Of LLMs For Code Generation

Cybersecurity Ventures predicts that by 2025, cybercrime will cost the world $10.5 trillion annually, a massive increase from $3 trillion in…

Stealthy attack serves poisoned web pages only to AI agents
05
Sep
2025

Stealthy attack serves poisoned web pages only to AI agents

AI agents can be tricked into covertly performing malicious actions by websites that are hidden from regular users’ view, JFrog…

Lloyds Bank moves AI work onto Google Cloud platform
05
Sep
2025

Lloyds Bank to use Workday software to help select staff for redundancy

Lloyds Banking Group will monitor its Workday HR software to help it select the lowest performing staff who could be…

Streameast Piracy Empire Collapses After Global Crackdown
05
Sep
2025

Streameast Piracy Empire Collapses After Global Crackdown

In one of the international enforcement actions, the Alliance for Creativity and Entertainment (ACE), working alongside Egyptian authorities, has shut…

U.S. CISA adds Sitecore, Android, and Linux flaws to its Known Exploited Vulnerabilities catalog
05
Sep
2025

U.S. CISA adds Sitecore, Android, and Linux flaws to its Known Exploited Vulnerabilities catalog

U.S. CISA adds Sitecore, Android, and Linux flaws to its Known Exploited Vulnerabilities catalog Pierluigi Paganini September 05, 2025 U.S….

05
Sep
2025

Critical SAP S/4HANA Vulnerability Actively Exploited to Fully Compromise Your SAP System

A critical vulnerability in SAP S/4HANA is being actively exploited in the wild, allowing attackers with low-level user access to…

Attackers are exploiting critical SAP S/4HANA vulnerability (CVE-2025-42957)
05
Sep
2025

Attackers are exploiting critical SAP S/4HANA vulnerability (CVE-2025-42957)

A critical vulnerability (CVE-2025-42957) in SAP S/4HANA enterprise resource planning software is being exploited by attackers “to a limited extent”,…

SAP S/4HANA Critical Vulnerability CVE-2025-42957 Exploited in the Wild
05
Sep
2025

SAP S/4HANA Critical Vulnerability CVE-2025-42957 Exploited in the Wild

Sep 05, 2025Ravie LakshmananVulnerability / Enterprise Security A critical security vulnerability impacting SAP S/4HANA, an Enterprise Resource Planning (ERP) software,…

Justice Dept Seizes $848K In Crypto From Confidence Scams
05
Sep
2025

Justice Dept Seizes $848K In Crypto From Confidence Scams

The U.S. Department of Justice has initiated a civil forfeiture action targeting $848,247 in Tether (USDT), suspected to be proceeds…

CISA Warns of Android 0-Day Use-After-Free Vulnerability Exploited in Attacks
05
Sep
2025

CISA Warns of Android 0-Day Use-After-Free Vulnerability Exploited in Attacks

CISA has issued an urgent alert regarding a zero-day vulnerability in the Android operating system that is being actively exploited…