DOJ reaches $9.8 million settlement with Illumina over cyber whistleblower claims
01
Aug
2025

DOJ reaches $9.8 million settlement with Illumina over cyber whistleblower claims

The Department of Justice on Thursday announced a $9.8 million settlement with Illumina over allegations that the company sold genomic-sequencing…

Lazarus Hackers Weaponize 234 npm and PyPI Packages to Infect Developers
01
Aug
2025

Lazarus Hackers Weaponize 234 npm and PyPI Packages to Infect Developers

Sonatype’s automated detection systems have uncovered an expansive and ongoing infiltration of the global open-source ecosystem by the notorious Lazarus…

Rethink authentication to remove the burden on users
01
Aug
2025

Securing agentic identities focus of Palo Alto’s CyberArk buy

Palo Alto Networks has placed securing agentic artificial intelligence (AI) front and centre as it lines up a $25bn (£18.8bn)…

Palo Alto Networks investigating ransomware threat related to SharePoint exploitation
01
Aug
2025

Palo Alto Networks investigating ransomware threat related to SharePoint exploitation

Researchers from Palo Alto Networks say they are investigating a ransomware attack related to the recently disclosed ToolShell vulnerabilities in…

Chinese Threat Actors Hack 11,000 Android Devices to Deploy PlayPraetor Malware
01
Aug
2025

Chinese Threat Actors Hack 11,000 Android Devices to Deploy PlayPraetor Malware

Chinese-speaking threat actors have used the PlayPraetor Remote Access Trojan (RAT) to infiltrate more than 11,000 Android devices globally in…

Print Friendly, PDF & Email
01
Aug
2025

The Role of Adaptive Learning in Continuous Vendor Monitoring

In today’s hyper-connected digital landscape, third-party vendors are integral to business operations. From cloud services and HR platforms to payment…

Comp AI secures $2.6M pre-seed to disrupt SOC 2 market
01
Aug
2025

Comp AI secures $2.6M pre-seed to disrupt SOC 2 market

San Francisco, California, August 1st, 2025, CyberNewsWire Comp AI Raises $2.6M in Pre-Seed Funding to Revolutionize Enterprise Compliance with AI-Powered…

Attackers Use Fake OAuth Apps with Tycoon Kit to Breach Microsoft 365 Accounts
01
Aug
2025

Attackers Use Fake OAuth Apps with Tycoon Kit to Breach Microsoft 365 Accounts

Cybersecurity researchers have detailed a new cluster of activity where threat actors are impersonating enterprises with fake Microsoft OAuth applications…

The blind spot: digital supply chain is now a board-level imperative
01
Aug
2025

The blind spot: digital supply chain is now a board-level imperative

Many organisations still lack visibility into their digital supply chains, leaving serious vulnerabilities despite rising incidents and new regulations like…

China accuses US of exploiting Microsoft zero-day in cyberattack
01
Aug
2025

China accuses US of exploiting Microsoft zero-day in cyberattack

U.S. intelligence agencies launched cyberattacks on two Chinese military enterprises dating back to 2022, in one case exploiting a Microsoft…

AI-powered Cursor IDE vulnerable to prompt-injection attacks
01
Aug
2025

AI-powered Cursor IDE vulnerable to prompt-injection attacks

A vulnerability that researchers call CurXecute is present in almost all versions of the AI-powered code editor Cursor, and can…

Hackers Exploit Microsoft 365’s Direct Send Feature for Internal Phishing Attacks
01
Aug
2025

Hackers Exploit Microsoft 365’s Direct Send Feature for Internal Phishing Attacks

Threat actors are leveraging Microsoft 365’s Direct Send feature to launch sophisticated phishing campaigns that mimic internal organizational emails, eroding…