Open Source CyberSOCEval Sets New Standards for AI in Malware Analysis and Threat Intelligence
16
Sep
2025

Open Source CyberSOCEval Sets New Standards for AI in Malware Analysis and Threat Intelligence

A groundbreaking open-source benchmark suite called CyberSOCEval has emerged as the first comprehensive evaluation framework for Large Language Models (LLMs)…

Apple Releases Security Update Patching Multiple Vulnerabilities in iOS 26 and iPadOS 26
16
Sep
2025

Apple Releases Security Update Patching Multiple Vulnerabilities in iOS 26 and iPadOS 26

Apple has released a comprehensive security update for iOS 26 and iPadOS 26, addressing 27 vulnerabilities across multiple system components. The update,…

16
Sep
2025

OT security needs continuous operations, not one-time fixes

Cyberattacks keep hitting the OT systems that critical infrastructure operators run, according to new research from Forrester. In a survey…

RowHammer Attack
16
Sep
2025

Phoenix RowHammer Attack Bypasses Advanced DDR5 Memory Protections in 109 Seconds

Sep 16, 2025Ravie LakshmananHardware Security / Vulnerability A team of academics from ETH Zürich and Google has discovered a new…

16
Sep
2025

Google introduces VaultGemma, a differentially private LLM built for secure data handling

Google has released VaultGemma, a large language model designed to keep sensitive data private during training. The model uses differential…

Insider breach at FinWise Bank exposes data of 689,000 AFF customers
16
Sep
2025

Insider breach at FinWise Bank exposes data of 689,000 AFF customers

Insider breach at FinWise Bank exposes data of 689,000 AFF customers Pierluigi Paganini September 16, 2025 An ex-employee caused an…

New Phoenix Rowhammer Attack Variant Bypasses Protection With DDR5 Chips
16
Sep
2025

New Phoenix Rowhammer Attack Variant Bypasses Protection With DDR5 Chips

A new Rowhammer attack variant named Phoenix can bypass the latest protections in modern DDR5 memory chips, researchers have revealed….

16
Sep
2025

Building security that protects customers, not just auditors

In this Help Net Security interview, Nir Rothenberg, CISO at Rapyd, discusses global differences in payment security maturity and the…

16
Sep
2025

From records to real-time: why systems of engagement matter

Dean Swan, Vice President and General Manager of monday.com in APJ, says it’s a model that keeps organisations looking in…

Microsoft Resolves Bluetooth Audio Problem in Windows 11 24H2 Update
16
Sep
2025

Microsoft Resolves Bluetooth Audio Problem in Windows 11 24H2 Update

Microsoft has addressed a widespread audio issue affecting Bluetooth speakers, headsets, and integrated laptop speakers in Windows 11 version 24H2….

16
Sep
2025

AI video surveillance could end privacy as we know it

AI-powered video surveillance brings up big questions about privacy. On one hand, it can make us feel safer, but on…

40 npm Packages Compromised in Supply Chain Attack Using bundle.js to Steal Credentials
16
Sep
2025

40 npm Packages Compromised in Supply Chain Attack Using bundle.js to Steal Credentials

Sep 16, 2025Ravie LakshmananMalware / Cyber Attack Cybersecurity researchers have flagged a fresh software supply chain attack targeting the npm…