Threat Actors Allegedly Listed iOS 26 Full‑Chain 0‑Day Exploit on Dark Web
A threat actor operating under the alias ResearcherX has posted what they claim to be a full‑chain zero‑day exploit targeting Apple’s recently released iOS 26…
A threat actor operating under the alias ResearcherX has posted what they claim to be a full‑chain zero‑day exploit targeting Apple’s recently released iOS 26…
This month’s roundup features exceptional open-source cybersecurity tools that are gaining attention for strengthening security across various environments. Heisenberg: Open-source software supply chain health check…
A nearly $1 billion project to deploy a single digital patient record (SDPR) in NSW is at risk of cost overruns, with system integration costs likely underestimated…
A new Malware-as-a-Service (MaaS) threat named “Olymp Loader” appeared in June 2025, aggressively advertised on underground hacker forums like XSS and HackForums. Advertised by an…
Customer identity has become one of the most brittle parts of the enterprise security stack. Teams know authentication matters, but organizations keep using methods that…
Japanese beverage giant Asahi Group Holdings has confirmed new findings in its ongoing investigation into the Asahi Group cyberattack, revealing that personal information linked to…
A significant gap in Microsoft Teams’ B2B guest access allows attackers to bypass Defender for Office 365 protections, creating unprotected zones for phishing and malware…
Fraud operations are expanding faster than payment defenses can adjust. Criminal groups function like coordinated businesses that develop tools, automate tasks, and scale attacks. New…
New Zealand is facing a new era of digital harm driven by AI-generated abuse, deception and harassment, according to new data released by Netsafe in…
By Daniel Ehrenreich, Consultant and Lecturer on Cyber Security, SCCE Introduction Professionals involved in securing Information Technology (IT) and Operational Technology/ Industrial Control Systems (OT/ICS)…
QBE Insurance Group has a “multi-lever” transformation underway, with technology investments driving improvements to date but leadership and startup culture set to play an even…
A newly discovered critical vulnerability in the Next.js framework allows attackers to crash self-hosted servers using a single HTTP request, requiring negligible resources to execute.…