September 2025 Patch Tuesday forecast: The CVE matrix
05
Sep
2025

September 2025 Patch Tuesday forecast: The CVE matrix

We work in an industry driven by Common Vulnerabilities and Exposures (CVE). Each security update released by myriad vendors addresses…

Chess.com Data Breach Exposes Information Of 4,541 Users
05
Sep
2025

Chess.com Data Breach Exposes Information Of 4,541 Users

Chess.com, one of the world’s largest online platforms for playing chess, has disclosed a data breach affecting 4,541 people, including…

Windows Heap-based Buffer Overflow Vulnerability Let Attackers Elevate Privileges
05
Sep
2025

Windows Heap-based Buffer Overflow Vulnerability Let Attackers Elevate Privileges

A recently patched vulnerability in a core Windows driver could allow a local attacker to execute code with the highest…

NightshadeC2 Botnet Exploits ‘UAC Prompt Bombing’ to Evade Windows Defender
05
Sep
2025

NightshadeC2 Botnet Exploits ‘UAC Prompt Bombing’ to Evade Windows Defender

A sophisticated new botnet called NightshadeC2 that employs an innovative “UAC Prompt Bombing” technique to evade Windows Defender and compromise…

How to reclaim control over your online shopping data
05
Sep
2025

How to reclaim control over your online shopping data

Online shopping is convenient, saves time, and everything is just a click away. But how often do we stop to…

Hackers Target Cisco ASA Devices in Massive Scan Across 25,000 IPs
05
Sep
2025

Hackers Target Cisco ASA Devices in Massive Scan Across 25,000 IPs

Security researchers have detected massive scanning campaigns targeting Cisco Adaptive Security Appliance (ASA) devices, with attackers probing over 25,000 unique…

Smart ways CISOs can do more with less
05
Sep
2025

Smart ways CISOs can do more with less

In this Help Net Security video, Jill Knesek, CISO at BlackLine, shares practical strategies for CISOs navigating tighter budgets. From…

Connected cars are smart, convenient, and open to cyberattacks
05
Sep
2025

Connected cars are smart, convenient, and open to cyberattacks

Consumers are concerned about vulnerabilities in their vehicles, which directly impacts purchasing behavior and brand loyalty, according to RunSafe Security….

Hackers Scanning Cisco ASA Devices to Exploit Vulnerabilities from 25,000 IPs
05
Sep
2025

Hackers Scanning Cisco ASA Devices to Exploit Vulnerabilities from 25,000 IPs

An unprecedented surge in malicious scanning activity targeting Cisco Adaptive Security Appliances (ASAs) occurred in late August 2025, with over…

How North Korean hackers are using fake job offers to steal cryptocurrency
05
Sep
2025

How North Korean hackers are using fake job offers to steal cryptocurrency

North Korean hackers are saturating the cryptocurrency industry with credible-sounding job offers as part of their campaign to steal digital…

Atlassian bets on AI browsers
05
Sep
2025

Atlassian bets on AI browsers

Atlassian will acquire New York-based startup The Browser Company for US$610 million (A$936 million) in cash, moving into the fast‑crowding…

ESET spots
05
Sep
2025

Academic researchers created AI-powered “PromptLock” ransomware

The “PromptLock” ransomware that cyber security firm ESET discovered last month has turned out to be an academic research prototype,…