Stronger ID Verification Is the New Frontline In Financial Compliance
27
Oct
2025

Stronger ID Verification Is the New Frontline In Financial Compliance

Right now, somewhere out there, a synthetic identity is being created – convincing enough to get past a background check,…

iOS 26 Overwrites ‘shutdown.log’ on Reboot, Erasing Forensic Evidence of Pegasus and Predator Spyware
27
Oct
2025

iOS 26 Overwrites ‘shutdown.log’ on Reboot, Erasing Forensic Evidence of Pegasus and Predator Spyware

As iOS 26 is being rolled out, a critical forensic challenge has emerged: the operating system now automatically overwrites the…

New Android Malware “HyperRat” Sold as a Ready-Made Remote Access Service
27
Oct
2025

New HyperRat Android Malware Sold as Ready-Made Spy Tool – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More

Cybersecurity researchers at iVerify have identified a new Android remote access trojan (RAT) called HyperRat, being promoted on cybercrime forums…

Ransomware, extortion groups adapt as payment rates reach historic lows
27
Oct
2025

Ransomware, extortion groups adapt as payment rates reach historic lows

Ransomware groups are facing an economic downturn of their own: In Q3 2025, only 23 percent of victims paid a…

North Canton City Council To Adopt Cybersecurity Policy
27
Oct
2025

North Canton City Council To Adopt Cybersecurity Policy

The City Council of North Canton, Ohio, is preparing to adopt a new cybersecurity policy designed to strengthen digital defenses…

Hackers Actively Exploiting WordPress Arbitrary Installation Vulnerabilities in The Wild
27
Oct
2025

Hackers Actively Exploiting WordPress Arbitrary Installation Vulnerabilities in The Wild

Threat actors have launched a significant mass exploitation campaign targeting critical vulnerabilities in two popular WordPress plugins, GutenKit and Hunk…

Dell Storage Manager Vulnerabilities Allow Full System Compromise
27
Oct
2025

Dell Storage Manager Vulnerabilities Allow Full System Compromise

Dell Technologies has disclosed three critical vulnerabilities affecting Dell Storage Manager that could allow unauthenticated remote attackers to completely compromise…

Don't Be Clueless About AI, Social Media, And Cybersecurity
27
Oct
2025

The Women Reimagining Cybersecurity’s Future

In an industry still dominated by men, May Chen-Contino is rewriting what cybersecurity leadership looks like. As CEO of Unit 221B,…

BIND 9 DNS Flaw Exposes 706K Servers
27
Oct
2025

BIND 9 DNS Flaw Exposes 706K Servers

A newly disclosed security flaw has put more than 706,000 BIND 9 DNS resolvers worldwide at risk of cache poisoning attacks, according…

A screenshot from an anti-fraud video campaign by the Hong Kong Monetary Authority. Photo: Handout
27
Oct
2025

Hong Kong businesses lose US$11 billion to digital fraud in past year, TransUnion says

Hong Kong businesses reported HK$92 billion (US$11.84 billion) in financial losses from digital fraud over the past year, despite the…

Scattered LAPSUS$ Hunters Onon Leak Website Taken Down By Law-enforcement Agencies
27
Oct
2025

Scattered LAPSUS$ Hunters Onon Leak Website Taken Down By Law-enforcement Agencies

Law enforcement agencies from the United States and France have seized the onion leak website operated by the notorious Scattered…

Critical HashiCorp Vault Vulnerabilities Allow Authentication Bypass and DoS Attacks
27
Oct
2025

Critical HashiCorp Vault Vulnerabilities Allow Authentication Bypass and DoS Attacks

HashiCorp has disclosed two critical vulnerabilities in Vault and Vault Enterprise that could enable attackers to bypass authentication mechanisms and…