Cyberattack On Co-op Causes £80m Loss And Data Breach
25
Sep
2025

Cyberattack On Co-op Causes £80m Loss And Data Breach

The Co-op has revealed that a malicious cyberattack earlier this year impacted its business, resulting in an £80 million hit…

Volvo Group ransomware data breach
25
Sep
2025

Volvo Group Employee Data Stolen in Ransomware Attack

Truck, bus and industrial equipment maker Volvo Group North America is notifying current and former employees of a data breach…

Gcore Radar Report Reveals 41% Surge in DDoS Attack Volumes
25
Sep
2025

Gcore Radar Report Reveals 41% Surge in DDoS Attack Volumes

Luxembourg, Luxembourg, September 25th, 2025, CyberNewsWire Gcore, the global edge AI, cloud, network, and security solutions provider, today announced the…

New Phishing Scam Aims at PyPI Maintainers to Steal Login Information
25
Sep
2025

New Phishing Scam Aims at PyPI Maintainers to Steal Login Information

A fresh wave of domain-confusion phishing emails is sweeping through the Python community, once again setting its sights on PyPI…

China-Linked Hackers Hit US Tech Firms with BRICKSTORM Malware
25
Sep
2025

China-Linked Hackers Hit US Tech Firms with BRICKSTORM Malware

A group of hackers with links to China has been caught running a long-term spying operation against US companies. Cybersecurity…

CVE-2025-20352
25
Sep
2025

Cisco IOS RCE Vulnerability CVE-2025-20352 Exploited

Cisco has publicly disclosed a critical remote code execution (RCE) vulnerability, tracked as CVE-2025-20352, affecting its widely deployed Cisco IOS…

NVIDIA Merlin Vulnerability Allow Attacker to Achieve Remote Code Execution With Root Privileges
25
Sep
2025

NVIDIA Merlin Vulnerability Allow Attacker to Achieve Remote Code Execution With Root Privileges

A critical vulnerability in NVIDIA’s Merlin Transformers4Rec library (CVE-2025-23298) enables unauthenticated attackers to achieve remote code execution (RCE) with root…

SetupHijack Tool Abuses Race Conditions in Windows Installer to Hijack Setups
25
Sep
2025

SetupHijack Tool Abuses Race Conditions in Windows Installer to Hijack Setups

Security researchers at Hacker House have released SetupHijack, a proof-of-concept tool that exploits race conditions and insecure file handling in…

25
Sep
2025

North Korean IT workers use fake profiles to steal crypto

ESET Research has published new findings on DeceptiveDevelopment, also called Contagious Interview. This North Korea-aligned group has become more active…

Malicious Rust Crates Steal Solana and Ethereum Keys — 8,424 Downloads Confirmed
25
Sep
2025

Malicious Rust Crates Steal Solana and Ethereum Keys — 8,424 Downloads Confirmed

Sep 25, 2025Ravie LakshmananSoftware Security / Malware Cybersecurity researchers have discovered two malicious Rust crates impersonating a legitimate library called…

Zoom includes AI at no extra cost to crack enterprise adoption puzzle
25
Sep
2025

Zoom includes AI at no extra cost to crack enterprise adoption puzzle

Zoom has thrown down the gauntlet in the enterprise artificial intelligence (AI) race, with the announcement that AI Companion 3.0…

25
Sep
2025

Cisco Patches Zero-Day Flaw Affecting Routers and Switches

Cisco on Wednesday announced patches for 14 vulnerabilities in IOS and IOS XE, including a bug that has been exploited…