New FlipSwitch Hooking Technique Bypasses Linux Kernel Defenses
01
Oct
2025

New FlipSwitch Hooking Technique Bypasses Linux Kernel Defenses

The cybersecurity landscape witnessed the emergence of a sophisticated rootkit variation, FlipSwitch, targeting modern Linux kernels. First surfacing in late…

01
Oct
2025

Senior Travel Scams Used by Threat Actors to Distribute Datzbro Malware

In August 2025, Australian authorities issued multiple scam alerts after users reported suspicious Facebook groups promoting “active senior trips.” What…

How UK tech firms can reduce risk amid reforms to immigration
01
Oct
2025

How UK immigration must evolve to attract the best global talent

As businesses tackle skills shortages and global competition for top talent intensifies, UK immigration policies must do more to actively…

GOP senator confirms pending White House quantum push, touts legislative alternatives
01
Oct
2025

GOP senator confirms pending White House quantum push, touts legislative alternatives

Sen. Marsha Blackburn, R-Tenn., endorsed an aggressive effort by U.S. policymakers to help governments and businesses adapt to a future…

Google Drive
01
Oct
2025

Google Drive for desktop gets AI-powered ransomware detection

Google has begun rolling out a new AI-powered security feature for Google Drive desktop, which will automatically pause file syncing…

Allianz Life Data Breach Exposes Personal Records of 1.5 Million Users
01
Oct
2025

Allianz Life Data Breach Exposes Personal Records of 1.5 Million Users

Allianz Life Insurance Company of North America has reported a significant data security incident that has exposed the sensitive personal…

Navigating Complexity: CISO Strategies for Security Tool Consolidation and Budget Optimization
01
Oct
2025

Navigating Complexity: CISO Strategies for Security Tool Consolidation and Budget Optimization

In the dynamic landscape of modern cybersecurity, Chief Information Security Officers (CISOs) often face a paradoxical challenge: the proliferation of…

Chinese State-Sponsored Hackers Exploiting Network Edge Devices to Harvest Sensitive Data
01
Oct
2025

Chinese State-Sponsored Hackers Exploiting Network Edge Devices to Harvest Sensitive Data

Chinese state-sponsored cyber threat group Salt Typhoon has been targeting global telecommunications infrastructure since at least 2019, exploiting network edge…

Threat Hunting & AI In SOC
01
Oct
2025

Threat Hunting & AI In SOC

01 Oct Threat Hunting & AI In SOC | Ben McGavin, Justin Dolgos, Todd Willoughby (RSM) With Vladislav Babiuk Posted…

Black Hat USA: Startup breaks secrets management tools
01
Oct
2025

EU Chat Control plans pose ‘existential catastrophic risk’ to encryption, says Signal

European proposals to require technology companies to scan the contents of communications sent through encrypted email and messaging services pose…

Hacking smarter with Burp AI: NahamSec puts Burp AI to the test | Blog
01
Oct
2025

Hacking smarter with Burp AI: NahamSec puts Burp AI to the test | Blog

Andrzej Matykiewicz | 01 October 2025 at 14:31 UTC Bug bounty legend, NahamSec, has taken Burp AI for a spin….

Allianz Life says July data breach impacts 1.5 million people
01
Oct
2025

Allianz Life says July data breach impacts 1.5 million people

Allianz Life has completed the investigation into the cyberattack it suffered in July and determined that nearly 1.5 million individuals…