Jaguar Land Rover shuts down systems after cyberattack
03
Sep
2025

Jaguar Land Rover shuts down systems after cyberattack

Jaguar Land Rover shuts down systems after cyberattack, no evidence of customer data theft Pierluigi Paganini September 03, 2025 Jaguar…

Android Security Update - Patch for 0-Day Vulnerabilities Actively Exploited in Attack
03
Sep
2025

Android Security Update – Patch for 0-Day Vulnerabilities Actively Exploited in Attack

In response to the discovery of actively exploited 0-day vulnerabilities, Google has released its September 2025 Android Security Bulletin, rolling…

BruteForceAI Tool Automates Login Page Detection and Attacks
03
Sep
2025

BruteForceAI Tool Automates Login Page Detection and Attacks

A cutting-edge penetration testing tool called BruteForceAI has arrived, bringing automation and artificial intelligence to the art of login page detection and…

Cloudflare Blocks Record-Breaking 11.5 Tbps DDoS Attack
03
Sep
2025

Cloudflare Blocks Record-Breaking 11.5 Tbps DDoS Attack

Sep 03, 2025Ravie LakshmananThreat Intelligence / Network Security Cloudflare on Tuesday said it automatically mitigated a record-setting volumetric distributed denial-of-service…

CISA Warns of WhatsApp 0-Day Vulnerability Exploited in Attacks
03
Sep
2025

CISA Warns of WhatsApp 0-Day Vulnerability Exploited in Attacks

CISA has issued an urgent advisory concerning a newly disclosed zero-day vulnerability in Meta Platforms’ WhatsApp messaging service (CVE-2025-55177).  This…

New TinyLoader Malware Attacking Windows Users Via Network Shares and Fake Shortcuts Files
03
Sep
2025

New TinyLoader Malware Attacking Windows Users Via Network Shares and Fake Shortcuts Files

A stealthy new malware loader dubbed TinyLoader has begun proliferating across Windows environments, exploiting network shares and deceptive shortcut files…

IIS WebDeploy RCE Vulnerability Gets Public PoC
03
Sep
2025

IIS WebDeploy RCE Vulnerability Gets Public PoC

A newly disclosed remote code execution (RCE) vulnerability in Microsoft’s IIS Web Deploy toolchain has captured industry attention after the…

Hacker Collective Threatens Google With Data Leak Ultimatum
03
Sep
2025

Hacker Collective Threatens Google With Data Leak Ultimatum

A hacker collective identifying itself as the Scattered LapSus Hunters has issued a direct threat to Google, demanding the termination…

Australian CIOs surge ahead in AI adoption
03
Sep
2025

Australian CIOs surge ahead in AI adoption

New data from an OpenText–Ponemon study of nearly 1,900 global CIOs and IT security leaders highlight while AI adoption is…

Hackers Leverage Hexstrike-AI Tool to Exploit Zero Day Vulnerabilities Within 10 Minutes
03
Sep
2025

Hackers Leverage Hexstrike-AI Tool to Exploit Zero Day Vulnerabilities Within 10 Minutes

Threat actors are rapidly weaponizing Hexstrike-AI, a recently released AI-powered offensive security framework, to scan for and exploit zero-day CVEs…

Hackers Use Hexstrike-AI to Exploit Zero-Day Flaws in Just 10 Minutes
03
Sep
2025

Hackers Use Hexstrike-AI to Exploit Zero-Day Flaws in Just 10 Minutes

Within hours of its release, the newly unveiled framework Hexstrike-AI has emerged as a game-changer for cybercriminals, enabling them to scan, exploit…

BruteForceAI: Free AI-powered login brute force tool
03
Sep
2025

BruteForceAI: Free AI-powered login brute force tool

BruteForceAI is a penetration testing tool that uses LLMs to improve the way brute-force attacks are carried out. Instead of…