Google Project Zero Details ASLR Bypass on Apple Devices Using NSDictionary Serialization
28
Sep
2025

Google Project Zero Details ASLR Bypass on Apple Devices Using NSDictionary Serialization

A Google Project Zero researcher has detailed a novel technique for remotely leaking memory addresses on Apple’s macOS and iOS….

DragonForce operator chained SimpleHelp flaws to target an MSP and its customers
28
Sep
2025

Ohio’s Union County suffers ransomware attack impacting 45,000 people

Ohio’s Union County suffers ransomware attack impacting 45,000 people Pierluigi Paganini September 27, 2025 A ransomware attack resulted in the…

Dutch teens arrested for trying to spy on Europol for Russia
28
Sep
2025

Dutch teens arrested for trying to spy on Europol for Russia

Two Dutch teenage boys aged 17, reportedly used hacking devices to spy for Russia, have been arrested by the Politie on Monday….

Microsoft Teams
27
Sep
2025

Fake Microsoft Teams installers push Oyster malware via malvertising

Hackers have been spotted using SEO poisoning and search engine advertisements to promote fake Microsoft Teams installers that infect Windows devices…

ForcedLeak flaw in Salesforce Agentforce exposes CRM data via Prompt Injection
27
Sep
2025

ForcedLeak flaw in Salesforce Agentforce exposes CRM data via Prompt Injection

ForcedLeak flaw in Salesforce Agentforce exposes CRM data via Prompt Injection Pierluigi Paganini September 27, 2025 Researchers disclosed a critical…

The Looming Authorization Crisis: Why Traditional IAM Fails Agentic AI
27
Sep
2025

The Looming Authorization Crisis: Why Traditional IAM Fails Agentic AI

In today’s enterprise world, AI no longer just answers questions or writes emails, but it takes action. From copilots booking…

An App Used to Dox Charlie Kirk Critics Doxed Its Own Users Instead
27
Sep
2025

An App Used to Dox Charlie Kirk Critics Doxed Its Own Users Instead

New research released this week shows that over the past few years the US Department of Homeland Security has collected…

Embracing the AI Revolution: How to Incorporate Generative AI into Your SOC 2 Compliance Plan
27
Sep
2025

Embracing the AI Revolution: How to Incorporate Generative AI into Your SOC 2 Compliance Plan

Generative AI (Gen AI) has emerged as a transformative force. From streamlining operations to enhancing customer experiences, AI-powered solutions offer…

Inside the Nuclear Bunkers, Mines, and Mountains Being Retrofitted as Data Centers
27
Sep
2025

Inside the Nuclear Bunkers, Mines, and Mountains Being Retrofitted as Data Centers

Data centers are responsible for running many of the services that underpin the systems we interact with every day. Transportation, logistics, energy,…

China-Linked PlugX and Bookworm Malware Attacks Target Asian Telecom and ASEAN Networks
27
Sep
2025

China-Linked PlugX and Bookworm Malware Attacks Target Asian Telecom and ASEAN Networks

Sep 27, 2025Ravie LakshmananMalware / Network Security Telecommunications and manufacturing sectors in Central and South Asian countries have emerged as…

Malware Operators Collaborate With Covert North Korean IT Workers to Attack Corporate Organizations
27
Sep
2025

Malware Operators Collaborate With Covert North Korean IT Workers to Attack Corporate Organizations

A sophisticated cybercriminal alliance between malware operators and covert North Korean IT workers has emerged as a significant threat to…

Hackers use Weaponized Microsoft Teams Installer to Compromise Systems With Oyster Malware
27
Sep
2025

Hackers use Weaponized Microsoft Teams Installer to Compromise Systems With Oyster Malware

A sophisticated malvertising campaign is using fake Microsoft Teams installers to compromise corporate systems, leveraging poisoned search engine results and…