15
Sep
2025

Arkime: Open-source network analysis and packet capture system

Arkime is an open-source system for large-scale network analysis and packet capture. It works with your existing security tools to…

VoidProxy PhaaS Targets Microsoft 365 and Google Accounts in New Campaign
15
Sep
2025

VoidProxy PhaaS Targets Microsoft 365 and Google Accounts in New Campaign

Phishing-as-a-Service operation called VoidProxy that uses advanced adversary-in-the-middle techniques to bypass traditional multi-factor authentication and steal session tokens from Microsoft…

5G Connectivity: Powering Extreme Sports Through Unmatched Wireless WAN Reliability
15
Sep
2025

5G Connectivity: Powering Extreme Sports Through Unmatched Wireless WAN Reliability

In the world of extreme sports, where split-second decisions and real-time data can define victory, reliable, high-performance connectivity is no…

BitlockMove Tool Enables Lateral Movement via Bitlocker DCOM & COM Hijacking
15
Sep
2025

BitlockMove Tool Enables Lateral Movement via Bitlocker DCOM & COM Hijacking

A new proof-of-concept (PoC) tool named BitlockMove demonstrates a novel lateral movement technique that leverages BitLocker’s Distributed Component Object Model…

A screenshot of one of the deepfake videos used to try and blackmail MPs shared in a social media post by Communications Minister Fahmi Fadzil. Photo: X/Fashmi_Fadzil
15
Sep
2025

Malaysian MPs targeted by deepfake sex video blackmail demanding US$100,000 payments

Authorities in Malaysia are hunting the suspect behind a blackmail attempt on at least 10 lawmakers who received emails demanding…

ChatGPT initially refused to create the IDs, but altering the prompt allowed hackers to bypass this restriction. Photo: AFP
15
Sep
2025

ChatGPT deepfakes military IDs for North Korean hackers, researchers find

A suspected North Korean state-sponsored hacking group used ChatGPT to create a deepfake of a military ID document to attack…

Beyond Bank levels up frontline ops with refined data strategy
15
Sep
2025

Beyond Bank levels up frontline ops with refined data strategy

Beyond Bank is advancing a data strategy to give frontline staff real-time insights to respond faster and with more personalisation…

Beyond Buzzwords: The Real Impact of AI on Identity Security
15
Sep
2025

Beyond Buzzwords: The Real Impact of AI on Identity Security

Artificial intelligence (AI) has become one of the most discussed technologies in recent years, often touted as the answer to…

NSW RegStar program resets as DCS exits key workstream
15
Sep
2025

NSW RegStar program resets as DCS exits key workstream

A multi-million-dollar government program to upgrade NSW’s licensing and registration systems has hit a roadblock, as the Department of Customer…

Beyond the Firewall: Protecting Your Marketing Department from Cyber Threats and Safeguarding Digital Assets
15
Sep
2025

Beyond the Firewall: Protecting Your Marketing Department from Cyber Threats and Safeguarding Digital Assets

Digital media created more opportunities for companies to engage with consumers than ever before, but such increased interconnectedness has a…

'WhiteCobra' floods VSCode market with crypto-stealing extensions
15
Sep
2025

‘WhiteCobra’ floods VSCode market with crypto-stealing extensions

A threat actor named WhiteCobra has targeting VSCode, Cursor, and Windsurf users by planting 24 malicious extensions in the Visual Studio…

15
Sep
2025

‘WhiteCobra’ floods VSCode market with crypto-stealing extensions

A threat actor named WhiteCobra has targeting VSCode, Cursor, and Windsurf users by planting 24 malicious extensions in the Visual Studio…