Qilin Ransomware Exploits MSPaint and Notepad to Locate Sensitive Files
27
Oct
2025

Qilin Ransomware Exploits MSPaint and Notepad to Locate Sensitive Files

In the latter half of 2025, the Qilin ransomware group has solidified its standing as a formidable threat, continuing to…

27
Oct
2025

ChatGPT Atlas Browser Can Be Tricked by Fake URLs into Executing Hidden Commands

The newly released OpenAI Atlas web browser has been found to be susceptible to a prompt injection attack where its…

Critical Dell Storage Manager Vulnerabilities Let Attackers Compromise System
27
Oct
2025

Critical Dell Storage Manager Vulnerabilities Let Attackers Compromise System

Dell Technologies has disclosed three critical vulnerabilities in its Storage Manager software that could allow attackers to bypass authentication, disclose…

Critical CoPhish Exploit Uses Copilot Studio to Hijack OAuth Tokens
27
Oct
2025

Critical CoPhish Exploit Uses Copilot Studio to Hijack OAuth Tokens

Security researchers at Datadog have uncovered a sophisticated phishing technique that weaponizes Microsoft Copilot Studio to conduct OAuth token theft…

DDoS, data theft, and malware are storming the gaming industry
27
Oct
2025

DDoS, data theft, and malware are storming the gaming industry

When the pandemic kept people at home in 2020, millions turned to games for an escape. The surge turned every…

week in security
27
Oct
2025

A week in security (October 20 – October 26)

October 24, 2025 – From agentic browsers to chat assistants, the same tools built to help us can also expose…

Microsoft Adds Wi-Fi-Based Work Location Auto-Detection to Teams
27
Oct
2025

Microsoft Adds Wi-Fi-Based Work Location Auto-Detection to Teams

Microsoft is preparing to introduce a groundbreaking feature in Teams that will revolutionise how hybrid workers manage their presence information….

Can your earbuds recognize you? Researchers are working on it
27
Oct
2025

Can your earbuds recognize you? Researchers are working on it

Biometric authentication has moved from fingerprints to voices to facial scans, but a team of researchers believes the next step…

WhatsApp 0-Click Exploit Disclosed to Meta at Pwn2Own Security Event
27
Oct
2025

WhatsApp 0-Click Exploit Disclosed to Meta at Pwn2Own Security Event

Cybersecurity researchers from Team Z3 have withdrawn their planned demonstration of a zero-click remote code execution vulnerability in WhatsApp at…

Dependency-Track: Open-source component analysis platform
27
Oct
2025

Dependency-Track: Open-source component analysis platform

Software is a patchwork of third-party components, and keeping tabs on what’s running under the hood has become a challenge….

706,000+ BIND 9 DNS Resolvers Exposed to Cache Poisoning
27
Oct
2025

706,000+ BIND 9 DNS Resolvers Exposed to Cache Poisoning

A critical vulnerability affecting more than 706,000 BIND 9 DNS resolvers worldwide has been disclosed with proof-of-concept exploit code now…

AI writes code like a junior dev, and security is feeling it
27
Oct
2025

AI writes code like a junior dev, and security is feeling it

The industry is entering a phase where code is being deployed faster than it can be secured, according to OX…