27
Aug
2025

AI Lets You Do Way More Stuff

When it comes to AI, people are often in one of two camps: They’re freaking out about AI and it’s…

Critical Chrome Use After Free Vulnerability Let Attackers Execute Arbitrary Code
27
Aug
2025

Critical Chrome Use After Free Vulnerability Let Attackers Execute Arbitrary Code

Google has released an emergency security update for Chrome to address a critical use-after-free vulnerability (CVE-2025-9478) in the ANGLE graphics…

Hackers Abuse Compromised OAuth Tokens to Access and Steal Salesforce Corporate Data
27
Aug
2025

Hackers Abuse Compromised OAuth Tokens to Access and Steal Salesforce Corporate Data

Google Threat Intelligence Group (GTIG) has issued an advisory concerning a broad data theft operation targeting corporate Salesforce instances via…

Hottest cybersecurity open-source tools of the month: August 2025
27
Aug
2025

Hottest cybersecurity open-source tools of the month: August 2025

This month’s roundup features exceptional open-source cybersecurity tools that are gaining attention for strengthening security across various environments. Buttercup: Open-source…

27
Aug
2025

I Built a Claude Code Context Modal Inside of Neovim

Kai: AI-powered coding in Neovim (click for full size) I use LazyVim, btw. lol I’ve been using AI to help…

Salesloft Drift Hacked to Steal OAuth Tokens and Exfiltrate from Salesforce Corporate Instances
27
Aug
2025

Salesloft Drift Hacked to Steal OAuth Tokens and Exfiltrate from Salesforce Corporate Instances

A sophisticated data exfiltration campaign targeting corporate Salesforce instances has exposed sensitive information from multiple organizations through compromised OAuth tokens…

Critical Chrome Use-After-Free Flaw Enables Arbitrary Code Execution
27
Aug
2025

Critical Chrome Use-After-Free Flaw Enables Arbitrary Code Execution

Google has released an urgent security update for the Chrome Stable channel to address a critical use-after-free vulnerability in the ANGLE graphics…

AI Security Map: Linking AI vulnerabilities to real-world impact
27
Aug
2025

AI Security Map: Linking AI vulnerabilities to real-world impact

A single prompt injection in a customer-facing chatbot can leak sensitive data, damage trust, and draw regulatory scrutiny in hours….

Woolworths cuts Big W loose from shared technology stack
27
Aug
2025

Woolworths cuts Big W loose from shared technology stack

Woolworths Group is set to decouple Big W from its shared technology infrastructure, transitioning the department store to a “standalone,…

New Hook Android Banking Malware With New Advanced Capabilities and Supports 107 Remote Commands
27
Aug
2025

New Hook Android Banking Malware With New Advanced Capabilities and Supports 107 Remote Commands

A sophisticated new variant of the Hook Android banking trojan has emerged with unprecedented capabilities that position it among the…

Citrix NetScaler ADC and Gateway Hit by Ongoing Attacks Exploiting 0-Day RCE
27
Aug
2025

Citrix NetScaler ADC and Gateway Hit by Ongoing Attacks Exploiting 0-Day RCE

Cloud Software Group has issued an emergency security bulletin warning of active exploitation targeting three critical vulnerabilities in NetScaler ADC and NetScaler…

How compliance teams can turn AI risk into opportunity
27
Aug
2025

How compliance teams can turn AI risk into opportunity

AI is moving faster than regulation, and that creates opportunities and risks for compliance teams. While governments work on new…