Beast Ransomware Targets Active SMB Connections to Infect Entire Networks
29
Oct
2025

Beast Ransomware Targets Active SMB Connections to Infect Entire Networks

A sophisticated ransomware operation known as Beast has emerged as a significant cybersecurity threat, employing aggressive network propagation tactics that…

Scammers target international students by threatening their visa status
29
Oct
2025

Scammers target international students by threatening their visa status

In 2025, the U.S. government revoked thousands of visas from international students, often without warning or explanation. According to a…

Apache Tomcat CVE-2025-55752, 55754 Security Flaws
29
Oct
2025

Apache Tomcat CVE-2025-55752, 55754 Security Flaws

The Apache Software Foundation has disclosed two new security vulnerabilities affecting multiple versions of Apache Tomcat, warning system administrators to take immediate action….

Microsoft Details ASP.NET Vulnerability That Enables Attackers To Smuggle HTTP Requests
29
Oct
2025

Microsoft Details ASP.NET Vulnerability That Enables Attackers To Smuggle HTTP Requests

Microsoft has issued a critical security update for ASP.NET Core to address CVE-2025-55315, a high-severity flaw that enables HTTP request…

New Atroposia RAT Uses Hidden Remote Desktop, Vulnerability Scanning and Advanced Persistence
29
Oct
2025

New Atroposia RAT Uses Hidden Remote Desktop, Vulnerability Scanning and Advanced Persistence

A sophisticated new remote access trojan called Atroposia has emerged in underground cybercrime marketplaces, offering attackers a comprehensive toolkit for…

AI agents can leak company data through simple web searches
29
Oct
2025

AI agents can leak company data through simple web searches

When a company deploys an AI agent that can search the web and access internal documents, most teams assume the…

Docker Compose Vulnerability Allow Attacks To Overwrite Arbitrary Files
29
Oct
2025

Docker Compose Vulnerability Allow Attacks To Overwrite Arbitrary Files

Docker Compose, a cornerstone tool for developers managing containerized application harbors a high-severity vulnerability that lets attackers overwrite files anywhere…

Gunra Ransomware Targets Windows and Linux with Dual Encryption
29
Oct
2025

Gunra Ransomware Targets Windows and Linux with Dual Encryption

The cybersecurity landscape continues to face persistent threats from emerging ransomware groups, with Gunra representing a significant concern since its…

Early reporting helps credit unions stop fraudulent transfers faster
29
Oct
2025

Early reporting helps credit unions stop fraudulent transfers faster

In this Help Net Security interview, Carl Scaffidi, CISO at VyStar Credit Union, discusses how credit unions are adapting to…

Mozilla Enforces Transparency Rules for Data Collection in New Firefox Extensions
29
Oct
2025

Mozilla Enforces Transparency Rules for Data Collection in New Firefox Extensions

Mozilla has announced a significant transparency initiative for its Firefox browser ecosystem, implementing mandatory data disclosure requirements for extension developers….

Product showcase: Syteca - The human-centric insider threat management platform
29
Oct
2025

Product showcase: Syteca – The human-centric insider threat management platform

Most organizations think the greatest danger lurks outside their walls. But statistics keep proving otherwise. According to Verizon’s 2025 Data…

Microsoft Issues Alert on ASP.NET Flaw Allowing HTTP Request Smuggling Attacks
29
Oct
2025

Microsoft Issues Alert on ASP.NET Flaw Allowing HTTP Request Smuggling Attacks

Microsoft has released a critical security update addressing a severe vulnerability in ASP.NET Core that could enable attackers to execute…