Hackers Tricks macOS Users to Execute Command in Terminal to Deliver FlexibleFerret Malware
27
Nov
2025

Hackers Tricks macOS Users to Execute Command in Terminal to Deliver FlexibleFerret Malware

Cybercriminals are successfully targeting Apple users through a sophisticated social engineering scheme that tricks victims into running harmful commands on…

Clover raises $36 million to scale product security through AI-native design
27
Nov
2025

Clover raises $36 million to scale product security through AI-native design

Clover announced $36 million in funding to secure the AI-native product wave. The company’s funding round was led by Notable…

Gainsight Expands Impacted Customer List Following Salesforce Security Alert
27
Nov
2025

Gainsight Expands Impacted Customer List Following Salesforce Security Alert

Nov 27, 2025Ravie LakshmananRansomware / Cloud Security Gainsight has disclosed that the recent suspicious activity targeting its applications has affected…

Regional execution blocking (Source - Bitdefender)
27
Nov
2025

Hackers Exploiting Fake Battlefield 6 Popularity to Deploy Stealers and C2 Agents

Since its release in October, Battlefield 6 has become one of the year’s most anticipated game launches. However, cybercriminals have…

Your critical infrastructure is running out of time
27
Nov
2025

Your critical infrastructure is running out of time

Cyber attackers often succeed not because they are inventive, but because the systems they target are old. A new report…

OpenAI Mixpanel Security Incident Exposes Limited User Data
27
Nov
2025

OpenAI Mixpanel Security Incident Exposes Limited User Data

OpenAI has confirmed a security incident involving Mixpanel, a third-party analytics provider used for its API product frontend. The company…

Japan’s Asahi admits cybersecurity ‘weakness’, says hackers stole info of 2 million people
27
Nov
2025

Japan’s Asahi admits cybersecurity ‘weakness’, says hackers stole info of 2 million people

Japanese drink giant Asahi Group Holdings said on Thursday an investigation has found that personal information linked to around 2…

Threat Actors Allegedly Listed iOS 26 Full‑Chain 0‑Day Exploit on Dark Web
27
Nov
2025

Threat Actors Allegedly Listed iOS 26 Full‑Chain 0‑Day Exploit on Dark Web

A threat actor operating under the alias ResearcherX has posted what they claim to be a full‑chain zero‑day exploit targeting…

Hottest cybersecurity open-source tools of the month: November 2025
27
Nov
2025

Hottest cybersecurity open-source tools of the month: November 2025

This month’s roundup features exceptional open-source cybersecurity tools that are gaining attention for strengthening security across various environments. Heisenberg: Open-source…

NSW' $969m single digital patient record at risk of cost overruns
27
Nov
2025

NSW’ $969m single digital patient record at risk of cost overruns

A nearly $1 billion project to deploy a single digital patient record (SDPR) in NSW is at risk of cost overruns, with…

27
Nov
2025

New Malware-as-a-Service Olymp Loader Advertised on Hacker Forums with It’s Anti-analysis and Detection Features

A new Malware-as-a-Service (MaaS) threat named “Olymp Loader” appeared in June 2025, aggressively advertised on underground hacker forums like XSS…

The identity mess your customers feel before you do
27
Nov
2025

The identity mess your customers feel before you do

Customer identity has become one of the most brittle parts of the enterprise security stack. Teams know authentication matters, but…