Mozilla Enforces Transparency Rules for Data Collection in New Firefox Extensions
29
Oct
2025

Mozilla Enforces Transparency Rules for Data Collection in New Firefox Extensions

Mozilla has announced a significant transparency initiative for its Firefox browser ecosystem, implementing mandatory data disclosure requirements for extension developers….

Product showcase: Syteca - The human-centric insider threat management platform
29
Oct
2025

Product showcase: Syteca – The human-centric insider threat management platform

Most organizations think the greatest danger lurks outside their walls. But statistics keep proving otherwise. According to Verizon’s 2025 Data…

Microsoft Issues Alert on ASP.NET Flaw Allowing HTTP Request Smuggling Attacks
29
Oct
2025

Microsoft Issues Alert on ASP.NET Flaw Allowing HTTP Request Smuggling Attacks

Microsoft has released a critical security update addressing a severe vulnerability in ASP.NET Core that could enable attackers to execute…

Proximity: Open-source MCP security scanner
29
Oct
2025

Proximity: Open-source MCP security scanner

Proximity is a new open-source tool that scans Model Context Protocol (MCP) servers. It identifies the prompts, tools, and resources…

Tasmanian gov agencies hit by cyber attack
29
Oct
2025

Tasmanian gov agencies hit by cyber attack

Tasmania’s government has confirmed that its VETtrak vocational student management system, which is used by several state agencies, has been…

29
Oct
2025

Humans Need Entropy | Daniel Miessler

I’ve had several thoughts on the Karpathy and Dwarkesh conversation that took place in late October 2025. But the one…

New Android Malware Herodotus Mimic Human Behaviour to Bypass Biometrics Detection
29
Oct
2025

New Android Malware Herodotus Mimic Human Behaviour to Bypass Biometrics Detection

A sophisticated Android banking trojan named Herodotus has emerged on the mobile threat landscape, introducing groundbreaking techniques to evade detection…

New Phishing Attack Using Invisible Characters Hidden in Subject Line Using MIME Encoding
29
Oct
2025

New Phishing Attack Using Invisible Characters Hidden in Subject Line Using MIME Encoding

Cybercriminals have developed a sophisticated phishing technique that exploits invisible characters embedded within email subject lines to evade automated security…

Digital payments accepted at a local restaurant in Malaysia. A lack of quantum-safe infrastructure in Asean, where digital payment adoption is accelerating, leaves transactions exposed, experts warn. Photo: Shutterstock
29
Oct
2025

Quantum computing threat looms over Asia’s financial systems: ‘we are not secure’

Swathes of Asia’s financial systems are vulnerable to potential disruption from quantum computing technology, including those hosting secure transactions, industry…

Tata Motors Data Leak - 70+ TB of Sensitive Info and Test Drive Data Exposed via AWS Keys
29
Oct
2025

Tata Motors Data Leak – 70+ TB of Sensitive Info and Test Drive Data Exposed via AWS Keys

Security researcher Eaton Zveare has disclosed critical vulnerabilities in Tata Motors’ systems that exposed over 70 terabytes of sensitive data,…

Pentest Copilot - AI-based Ethical Hacking Tool to Streamline Penetration Testing
29
Oct
2025

Pentest Copilot – AI-based Ethical Hacking Tool to Streamline Penetration Testing

Pentest Copilot is an innovative open-source tool that leverages AI to help ethical hackers streamline penetration testing workflows. This browser-based…

Labor passes new triple zero laws
29
Oct
2025

Labor passes new triple zero laws

Labor has passed new ‘triple zero’ telecommunications laws that give the government powers to directly intervene in industry to ensure…