Westpac turns to AIOps and event-driven automation
11
Aug
2025

Westpac turns to AIOps and event-driven automation

Westpac is embracing event-driven automation and AIOps as part of a multi-year infrastructure automation program underpinned by Ansible. Westpac’s Sean…

New Win-DDoS Flaws Let Attackers Turn Public Domain Controllers into DDoS Botnet via RPC, LDAP
10
Aug
2025

New Win-DDoS Flaws Let Attackers Turn Public Domain Controllers into DDoS Botnet via RPC, LDAP

Aug 10, 2025Ravie LakshmananVulnerability / Network Security A novel attack technique could be weaponized to rope thousands of public domain…

Microsoft raises Zero Day Quest bug bounties to US$5 million
10
Aug
2025

Microsoft raises Zero Day Quest bug bounties to US$5 million

Microsoft has raised the total potential rewards for its Zero Day Quest bug bounty program from US$4 million to US$5…

10
Aug
2025

New Win-DDoS Flaws Let Attackers Turn Public Domain Controllers into DDoS Botnet via RPC, LDAP

Aug 10, 2025Ravie LakshmananVulnerability / Network Security A novel attack technique could be weaponized to rope thousands of public domain…

Google confirms Salesforce CRM breach, faces extortion threat
10
Aug
2025

Google confirms Salesforce CRM breach, faces extortion threat

Google confirms Salesforce CRM breach, faces extortion threat Pierluigi Paganini August 10, 2025 Google disclosed a Salesforce Customer Relationship Management…

Bouygues Telecom Hit by Cyberattack, 6.4 Million Customers Affected
10
Aug
2025

Bouygues Telecom Hit by Cyberattack, 6.4 Million Customers Affected

A cyberattack on Bouygues Telecom exposed data for 6.4 million customers. Find out what information was compromised and what you…

The AI Threat: How Enterprises Can Defend Against the Next Generation of Attacks
10
Aug
2025

The AI Threat: How Enterprises Can Defend Against the Next Generation of Attacks

AI is transforming the way work gets done across industries. But while it improves business efficiencies, it also arms cybercriminals…

Researchers Reveal ReVault Attack Targeting Dell ControlVault3 Firmware in 100+ Laptop Models
10
Aug
2025

Researchers Reveal ReVault Attack Targeting Dell ControlVault3 Firmware in 100+ Laptop Models

Aug 09, 2025Ravie LakshmananVulnerability / Hardware Security Cybersecurity researchers have uncovered multiple security flaws in Dell’s ControlVault3 firmware and its…

Researchers Detail Windows EPM Poisoning Exploit Chain Leading to Domain Privilege Escalation
10
Aug
2025

Researchers Detail Windows EPM Poisoning Exploit Chain Leading to Domain Privilege Escalation

Aug 10, 2025Ravie LakshmananVulnerability / Endpoint Security Cybersecurity researchers have presented new findings related to a now-patched security issue in…

Telcom Security: The Intersection of Critical Infrastructure
10
Aug
2025

Telcom Security: The Intersection of Critical Infrastructure

Telecommunications service providers (TSP) are foundational to the functioning of our modern technical society, serving as the conduit through which…

AgentFlayer 0-click exploit abuses ChatGPT Connectors to Steal 3rd-party app data
10
Aug
2025

AgentFlayer 0-click exploit abuses ChatGPT Connectors to Steal 3rd-party app data

AgentFlayer is a critical vulnerability in ChatGPT Connectors. Learn how this zero-click attack uses indirect prompt injection to secretly steal…

How to Protect Yourself From Portable Point-of-Sale Scams
10
Aug
2025

How to Protect Yourself From Portable Point-of-Sale Scams

Considering the widespread use of contactless payment systems, it’s no surprise that portable point-of-sale thefts are making a comeback. This…