New Australian Managing Director for Cohesity
01
Sep
2025

New Australian Managing Director for Cohesity

Cohesity has appointed James Eagleton as Managing Director for Australia and New Zealand (ANZ). In this role, Eagleton will be…

Hackers Exploit Windows Defender Policies to Shut Down EDR Agents
01
Sep
2025

Hackers Exploit Windows Defender Policies to Shut Down EDR Agents

Cybercriminals are now weaponizing Windows Defender Application Control (WDAC) policies to disable Endpoint Detection and Response (EDR) agents en masse….

AIDEFEND: Free AI defense framework
01
Sep
2025

AIDEFEND: Free AI defense framework

AIDEFEND (Artificial Intelligence Defense Framework) is an open knowledge base dedicated to AI security, providing defensive countermeasures and best practices…

Linux UDisks daemon Vulnerability Let Attackers Gaining Access to Files Owned by Privileged Users
01
Sep
2025

Linux UDisks daemon Vulnerability Let Attackers Gaining Access to Files Owned by Privileged Users

A critical security vulnerability has been discovered in the Linux UDisks daemon that could allow unprivileged attackers to gain access…

APT Groups Weaponize Infostealer Malware in Precision Attacks
01
Sep
2025

APT Groups Weaponize Infostealer Malware in Precision Attacks

The cybersecurity landscape has witnessed a dangerous evolution as Advanced Persistent Threat (APT) groups increasingly weaponize opportunistic infostealer malware for…

KillChainGraph: Researchers test machine learning framework for mapping attacker behavior
01
Sep
2025

KillChainGraph: Researchers test machine learning framework for mapping attacker behavior

A team of researchers from Frondeur Labs, DistributedApps.ai, and OWASP has developed a new machine learning framework designed to help…

CISA Releases Nine ICS Advisories Surrounding Vulnerabilities, and Exploits
01
Sep
2025

CISA Releases Nine ICS Advisories Surrounding Vulnerabilities, and Exploits

The Cybersecurity and Infrastructure Security Agency (CISA) has published nine Industrial Control Systems (ICS) advisories on August 28, 2025, detailing…

Linux UDisks Daemon Vulnerability Lets Attackers Access Privileged User Files
01
Sep
2025

Linux UDisks Daemon Vulnerability Lets Attackers Access Privileged User Files

Red Hat has disclosed a critical security flaw in the Udisks daemon that allows unprivileged users to exploit an out-of-bounds…

Boards are being told to rethink their role in cybersecurity
01
Sep
2025

Boards are being told to rethink their role in cybersecurity

Boards of directors are being told that cybersecurity is now central to business resilience and growth, and that they must…

Cybersecurity signals: Connecting controls and incident outcomes
01
Sep
2025

Cybersecurity signals: Connecting controls and incident outcomes

There is constant pressure on security leaders to decide which controls deserve the most attention and budget. A new study…

How Prompt Injection Attacks Bypassing AI Agents With Users Input
01
Sep
2025

How Prompt Injection Attacks Bypassing AI Agents With Users Input

Prompt injection attacks have emerged as one of the most critical security vulnerabilities in modern AI systems, representing a fundamental…

2 Hong Kong public hospital doctors arrested over patient data leak
01
Sep
2025

2 Hong Kong public hospital doctors arrested over patient data leak

Two public hospital doctors have been arrested in Hong Kong for allegedly leaking patient information, the Post has learned. While…