BMC Firmware Vulnerabilities Allow Attackers to Bypass Signature Verification Features
25
Sep
2025

BMC Firmware Vulnerabilities Allow Attackers to Bypass Signature Verification Features

Critical vulnerabilities discovered in Supermicro Baseboard Management Controller (BMC) firmware have exposed a troubling pattern where inadequate security fixes create…

Linux Kernel ksmbd Flaw Lets Remote Attackers Execute Arbitrary Code
25
Sep
2025

Linux Kernel ksmbd Flaw Lets Remote Attackers Execute Arbitrary Code

A critical vulnerability in the Linux Kernel’s ksmbd file sharing component allows remote attackers to execute code with kernel privileges….

25
Sep
2025

$439 million recovered in global financial crime crackdown

Authorities around the world have recovered $439 million from criminals following a months-long operation led by INTERPOL. The effort, called…

NVIDIA Merlin Flaw Enables Remote Code Execution with Root Access
25
Sep
2025

NVIDIA Merlin Flaw Enables Remote Code Execution with Root Access

A critical vulnerability in NVIDIA’s Merlin Transformers4Rec library allows attackers to achieve remote code execution with root privileges. Discovered by…

25
Sep
2025

New framework sets baseline for SaaS security controls

Managing security across dozens or even hundreds of SaaS apps has become a major headache. Each tool has its own…

Banking Trojans Attacking Android Users Mimic as Government and Legitimate Payment Apps
25
Sep
2025

Banking Trojans Attacking Android Users Mimic as Government and Legitimate Payment Apps

A sophisticated cybercriminal campaign has emerged targeting Indonesian and Vietnamese Android users with banking trojans disguised as legitimate government identity…

Critical DNN Platform Vulnerability Let Attackers Execute Malicious Scripts
25
Sep
2025

Critical DNN Platform Vulnerability Let Attackers Execute Malicious Scripts

A critical stored cross-site scripting vulnerability has emerged in the popular DotNetNuke (DNN) Platform, threatening websites powered by this widely-used…

Cyber compliance often overlooks third-party risks, warns Identifly CSO
25
Sep
2025

Cyber compliance often overlooks third-party risks, warns Identifly CSO

Aaron Finnis, chief strategy officer at Identity and Access Management (IAM) specialist Identifly, has echoed others in the cybersecurity industry…

Australian Gas Infrastructure Group in second phase of CRM transformation
25
Sep
2025

Australian Gas Infrastructure Group in second phase of CRM transformation

Australian Gas Infrastructure Group is entering the second phase of a CRM transformation, with an end goal of establishing a…

AI Comprehension Gaps: When Humans and AI See Different Things: · Joseph Thacker
25
Sep
2025

AI Comprehension Gaps: When Humans and AI See Different Things: · Joseph Thacker

There’s an AI Security and Safety concept that I’m calling an “AI Comprehension Gap.” It’s a bit of a mouthful,…

Internet shutdowns in Africa on upward trajectory
25
Sep
2025

Internet shutdowns in Africa on upward trajectory

More than 190 internet shutdowns have been recorded in 41 African countries since 2016, the African Digital Rights Network (ADRN)…

GIO deploys 'Postie Pat' to streamline offshore claims routing
25
Sep
2025

GIO deploys ‘Postie Pat’ to streamline offshore claims routing

GIO is using a digital assistant to help its Australia-based claims teams correctly route work to an offshore centre for…