Multiple Google Chrome Flaws Allow Attackers to Execute Arbitrary Code
08
Oct
2025

Multiple Google Chrome Flaws Allow Attackers to Execute Arbitrary Code

Google rolled out version 141.0.7390.65/.66 for Windows and Mac and 141.0.7390.65 for Linux. This update fixes three critical security flaws,…

OpenAI Disrupts Russian, North Korean, and Chinese Hackers Misusing ChatGPT for Cyberattacks
08
Oct
2025

OpenAI Disrupts Russian, North Korean, and Chinese Hackers Misusing ChatGPT for Cyberattacks

OpenAI on Tuesday said it disrupted three activity clusters for misusing its ChatGPT artificial intelligence (AI) tool to facilitate malware…

Oracle E-Business Suite hack
08
Oct
2025

Exploitation of Oracle EBS Zero-Day Started 2 Months Before Patching

More information has come to light on the recently patched Oracle E-Business Suite (EBS) zero-day, with evidence indicating that threat…

Multiple Chrome Vulnerabilities Expose Users to Arbitrary Code Execution Attacks
08
Oct
2025

Multiple Chrome Vulnerabilities Expose Users to Arbitrary Code Execution Attacks

Google has released Chrome version 141.0.7390.65/.66 for Windows and Mac, along with 141.0.7390.65 for Linux, addressing multiple critical security vulnerabilities…

FreePBX SQL Injection Vulnerability Leads to Database Tampering
08
Oct
2025

FreePBX SQL Injection Vulnerability Leads to Database Tampering

A critical SQL injection vulnerability in FreePBX, designated as CVE-2025-57819, has been actively exploited by attackers to modify the database and…

08
Oct
2025

Radiflow360 unifies OT risk, compliance, and response

Radiflow has launched the new Radiflow360, a unified, AI-enhanced OT cybersecurity platform that delivers visibility, risk management and streamlined incident…

Crimson Collective Exploits AWS Services to Steal Sensitive Data
08
Oct
2025

Crimson Collective Exploits AWS Services to Steal Sensitive Data

A newly identified threat group called Crimson Collective has emerged as a significant security concern for organizations using Amazon Web Services (AWS),…

08
Oct
2025

Rethinking AI security architectures beyond Earth

If you think managing cloud security is complex, try doing it across hundreds of satellites orbiting the planet. Each one…

BK Technologies Data Breach, IT Systems Compromised, Data Stolen
08
Oct
2025

BK Technologies Data Breach, IT Systems Compromised, Data Stolen

BK Technologies Corporation, a Florida-based communications equipment manufacturer, disclosed a significant cybersecurity incident that compromised its IT systems and potentially…

08
Oct
2025

DefectDojo: Open-source DevSecOps platform – Help Net Security

DefectDojo is an open-source tool for DevSecOps, application security posture management (ASPM), and vulnerability management. It helps teams manage security…

"Mic-E-Mouse" Attack Lets Hackers Steal Sensitive Data via Mouse Sensors
08
Oct
2025

“Mic-E-Mouse” Attack Lets Hackers Steal Sensitive Data via Mouse Sensors

A groundbreaking cybersecurity vulnerability has been discovered that transforms everyday computer mice into sophisticated eavesdropping tools. Researchers have developed the…

08
Oct
2025

Developing economies are falling behind in the fight against cybercrime

Cybercrime is a global problem, but not every country is equally equipped to fight it. In many developing economies, cybersecurity…