Microsoft PlayReady DRM Used by Netflix, Amazon, and Disney+ Leaked Online
04
Aug
2025

Microsoft PlayReady DRM Used by Netflix, Amazon, and Disney+ Leaked Online

A significant security breach has compromised Microsoft’s PlayReady Digital Rights Management (DRM) system, exposing critical certificates that protect premium streaming…

Critical HashiCorp Vulnerability Allows Attackers to Run Code on Host Machine
04
Aug
2025

Critical HashiCorp Vulnerability Allows Attackers to Run Code on Host Machine

HashiCorp has disclosed a critical security vulnerability affecting its Vault products that could allow privileged operators to execute arbitrary code…

The surprising truth about identity security confidence
04
Aug
2025

The surprising truth about identity security confidence

Organizations most confident in their identity security are often the least prepared, according to a new report from BeyondID. The…

Interlock Ransomware Employs ClickFix Technique to Run Malicious Commands on Windows Machines
04
Aug
2025

Interlock Ransomware Employs ClickFix Technique to Run Malicious Commands on Windows Machines

The cybersecurity landscape continues to evolve as threat actors develop increasingly sophisticated methods to compromise Windows systems. A new ransomware…

Critical Squid Flaw Allows Remote Code Execution by Attackers
04
Aug
2025

Critical Squid Flaw Allows Remote Code Execution by Attackers

A severe security vulnerability in the widely-used Squid HTTP proxy has been disclosed, potentially exposing millions of systems to remote…

AIBOMs are the new SBOMs: The missing link in AI risk management
04
Aug
2025

AIBOMs are the new SBOMs: The missing link in AI risk management

In this Help Net Security interview, Marc Frankel, CEO at Manifest Cyber, discusses how overlooked AI-specific risks, like poisoned training…

Shadow AI risks proliferate - Australian Cyber Security Magazine
04
Aug
2025

Shadow AI risks proliferate – Australian Cyber Security Magazine

Netskope has released new research showing a 50% spike in genAI platform usage among enterprise end-users in the three months…

AI-Powered Cursor IDE Exposes Users to Silent Remote Code Execution
04
Aug
2025

AI-Powered Cursor IDE Exposes Users to Silent Remote Code Execution

Cybersecurity researchers at Aim Labs have discovered a critical vulnerability in the popular AI-powered Cursor IDE that enables attackers to…

Average global data breach cost now $4.44 million
04
Aug
2025

Average global data breach cost now $4.44 million

IBM released its Cost of a Data Breach Report, which revealed AI adoption is greatly outpacing AI security and governance….

How Azure Landing Zones can set the structure for cloud success
04
Aug
2025

How Azure Landing Zones can set the structure for cloud success

Cloud success isn’t defined by what you can deploy, but by what you can operate, govern, and grow, with confidence,…

Free Assessment Tool to Navigate Child Safety Age Assurance Compliance
04
Aug
2025

Free Assessment Tool to Navigate Child Safety Age Assurance Compliance

AU10TIX has launched a free Child Safety Age Assurance Risk and Readiness Assessment and Age Assurance Readiness Guide designed to…

Open-source password recovery utility Hashcat 7.0.0 released
04
Aug
2025

Open-source password recovery utility Hashcat 7.0.0 released

Hashcat is an open-source password recovery tool that supports five attack modes and more than 300 highly optimized hashing algorithms….