Workday Staff Fall To Social Engineering; Hackers Access Third-Party CRM Platform
18
Aug
2025

Workday Staff Fall To Social Engineering; Hackers Access Third-Party CRM Platform

Workday, a California-based human resource and financial management service provider, disclosed last week that it was recently targeted in a…

Nvidia CEO Jensen Huang attends the opening ceremony of the China International Supply Chain Expo in Beijing on July 16. Photo: Kyodo
18
Aug
2025

Nvidia’s efforts to please both US and China get harder as H20 becomes bargaining chip

On his visit to Beijing in July, Nvidia CEO Jensen Huang received a rock-star welcome as he announced to Chinese…

Windows 11 24H2 Security Update Causes SSD/HDD Failures and Potential Data Corruption
18
Aug
2025

Windows 11 24H2 Security Update Causes SSD/HDD Failures and Potential Data Corruption

A significant security update rolled out by Microsoft with the Windows 11 24H2 (KB5063878) release is causing widespread issues for…

Rockwell ControlLogix Ethernet Vulnerability Exposes Systems to Remote Code Execution
18
Aug
2025

Rockwell ControlLogix Ethernet Vulnerability Exposes Systems to Remote Code Execution

A critical vulnerability in Rockwell Automation’s ControlLogix Ethernet modules has been discovered that could allow remote attackers to execute malicious…

How security teams are putting AI to work right now
18
Aug
2025

How security teams are putting AI to work right now

AI is moving from proof-of-concept into everyday security operations. In many SOCs, it is now used to cut down alert…

Critical PostgreSQL Flaws Allow Code Injection During Restoration
18
Aug
2025

Critical PostgreSQL Flaws Allow Code Injection During Restoration

The PostgreSQL Global Development Group released emergency security updates on August 14, 2025, addressing three critical vulnerabilities that enable code…

Buttercup: Open-source AI-driven system detects and patches vulnerabilities
18
Aug
2025

Buttercup: Open-source AI-driven system detects and patches vulnerabilities

Buttercup is a free, automated, AI-powered platform that finds and fixes vulnerabilities in open-source software. Developed by Trail of Bits,…

Beware of New back-to-school Shopping Scams That Tricks Drives Users to Fake Shopping Sites
18
Aug
2025

Beware of New back-to-school Shopping Scams That Tricks Drives Users to Fake Shopping Sites

As families across the country prepare for the return to school, cybercriminals are exploiting the seasonal rush with a fresh…

Weak alerting and slipping prevention raise risk levels for CISOs
18
Aug
2025

Weak alerting and slipping prevention raise risk levels for CISOs

Prevention effectiveness is falling, detection gaps remain wide, and attackers are exploiting weaknesses in data protection and credentials. Data theft…

Google faces $55m fine over Telstra, Optus search deals
18
Aug
2025

Google faces $55m fine over Telstra, Optus search deals

Google is facing Federal Court proceedings and a $55 million fine over historical agreements struck with Telstra and Optus to…

Bridging the AI model governance gap: Key findings for CISOs
18
Aug
2025

Bridging the AI model governance gap: Key findings for CISOs

While most organizations understand the need for strong AI model governance, many are still struggling to close gaps that could…

IAG uses GenAI to decide whether to send tradies for 'make safe' repairs
18
Aug
2025

IAG uses GenAI to decide whether to send tradies for ‘make safe’ repairs

Insurer IAG is using generative artificial intelligence to assess whether a property requires urgent repairs following a hazard or incident….