AI Systems Capable of Generating Working Exploits for CVEs in Just 10–15 Minutes
22
Aug
2025

AI Systems Capable of Generating Working Exploits for CVEs in Just 10–15 Minutes

Cybersecurity researchers have developed an artificial intelligence system capable of automatically generating working exploits for published Common Vulnerabilities and Exposures…

22
Aug
2025

Automation Is Redefining Pentest Delivery

Aug 22, 2025The Hacker NewsPenetration Testing / Security Operations Pentesting remains one of the most effective ways to identify real-world…

22
Aug
2025

Exploiting API4 — 8 Real-World Unrestricted Resource Consumption Attack Scenarios (and How to Stop Them) — API Security

Unrestricted Resource Consumption (API4:2023) is the only threat category in the OWASP API Security Top 10 explicitly dedicated to Denial…

Azure's Default API Connection Vulnerability Enables Full Cross-Tenant Compromise
22
Aug
2025

Azure’s Default API Connection Vulnerability Enables Full Cross-Tenant Compromise

A critical vulnerability in Microsoft Azure’s API Connection infrastructure enabled attackers to compromise resources across different Azure tenants worldwide.  The…

Hackers Target Phones of Military-Linked Individuals in South Asia Using New Spy Tools
22
Aug
2025

Hackers Target Phones of Military-Linked Individuals in South Asia Using New Spy Tools

Cyber threat actors have launched sophisticated phishing operations aimed at military and government personnel in South Asia, leveraging defense-related lures…

22
Aug
2025

Automation Is Redefining Pentest Delivery

Aug 22, 2025The Hacker NewsPenetration Testing / Security Operations Pentesting remains one of the most effective ways to identify real-world…

Arrest
22
Aug
2025

Massive anti-cybercrime operation leads to over 1,200 arrests in Africa

Law enforcement authorities in Africa have arrested over 1,200 suspects as part of ‘Operation Serengeti 2.0,’ an INTERPOL-led international crackdown…

NIST Releases Control Overlays to Manage Cybersecurity Risks in Use and Developments of AI Systems
22
Aug
2025

NIST Releases Control Overlays to Manage Cybersecurity Risks in Use and Developments of AI Systems

The National Institute of Standards and Technology (NIST) has unveiled a comprehensive concept paper outlining proposed NIST SP 800-53 Control…

14 Million-Download SHA JavaScript Library Exposes Users to Hash Manipulation Attacks
22
Aug
2025

14 Million-Download SHA JavaScript Library Exposes Users to Hash Manipulation Attacks

A critical security vulnerability has been discovered in the widely-used sha.js npm package, exposing millions of applications to sophisticated hash…

Colt Technology faces multi-day outage after WarLock ransomware attack
22
Aug
2025

Colt Discloses Breach After Warlock Ransomware Group Puts Files Up for Sale

Colt Discloses Breach After Warlock Ransomware Group Puts Files Up for Sale Pierluigi Paganini August 22, 2025 Colt Technology Services…

DaVita
22
Aug
2025

DaVita says ransomware gang stole data of nearly 2.7 million people

Kidney dialysis firm DaVita has confirmed that a ransomware gang that breached its network stole the personal and health information…

Colt Confirms Customer Data Stolen in Ransomware Attack
22
Aug
2025

Colt Confirms Customer Data Stolen in Ransomware Attack

Telecommunications giant Colt Technology Services has confirmed that customer data was compromised in a sophisticated cyber attack that began on…