Food Delivery Robots Can Be Hacked to Deliver Meals to Your Table Instead of the Intended Customers
01
Sep
2025

Food Delivery Robots Can Be Hacked to Deliver Meals to Your Table Instead of the Intended Customers

You may have seen them in restaurants, cat-faced robots gliding between tables, delivering plates of food. These robots, many of…

Spotlight On Leadership: Bolstering Corporate Security with OSINT And AI-Driven Intelligence
01
Sep
2025

Spotlight On Leadership: Bolstering Corporate Security with OSINT And AI-Driven Intelligence

Penlink’s CEO, Peter Weber, shares how leaders can reduce their odds of becoming yet another statistic through a debilitating cyber-attack by…

Apple May Drop Physical SIM Card in iPhone 17
01
Sep
2025

Apple May Drop Physical SIM Card in iPhone 17

Apple appears poised to remove the physical SIM card slot from its upcoming iPhone 17 models in more countries, with…

SQL Injection Flaw In IBM Watsonx Orchestrate
01
Sep
2025

SQL Injection Flaw In IBM Watsonx Orchestrate

A newly disclosed security vulnerability, tracked as CVE-2025-0165, has been reported, specifically concerning the users of the IBM Watsonx Orchestrate…

Crooks exploit Meta malvertising to target Android users with Brokewell
01
Sep
2025

Crooks exploit Meta malvertising to target Android users with Brokewell

Crooks exploit Meta malvertising to target Android users with Brokewell Pierluigi Paganini September 01, 2025 Cybercriminals spread Brokewell via fake…

Hackers Abuse Legitimate Email Marketing Platforms to Disguise Malicious Links
01
Sep
2025

Hackers Abuse Legitimate Email Marketing Platforms to Disguise Malicious Links

Cybercriminals are increasingly exploiting legitimate email marketing platforms to launch sophisticated phishing campaigns, leveraging the trusted reputation of these services…

Plain Text Storage of Vulnerability Exploit Helm Values
01
Sep
2025

Plain Text Storage of Vulnerability Exploit Helm Values

A high-severity vulnerability in SUSE’s Fleet, a GitOps management tool for Kubernetes clusters, has been disclosed by security researcher samjustus…

Rethinking Security for Scattered Spider
01
Sep
2025

Rethinking Security for Scattered Spider

As enterprises continue to shift their operations to the browser, security teams face a growing set of cyber challenges. In…

North Korea’s APT37 deploys RokRAT in new phishing campaign against academics
01
Sep
2025

North Korea’s APT37 deploys RokRAT in new phishing campaign against academics

North Korea’s APT37 deploys RokRAT in new phishing campaign against academics Pierluigi Paganini September 01, 2025 ScarCruft (APT37) launches Operation…

Beware of Fraudulent Scholarship Apps Attacking Students in Defarud Campaign
01
Sep
2025

Beware of Fraudulent Scholarship Apps Attacking Students in Defarud Campaign

A sophisticated Android malware campaign has emerged in recent months, targeting students in Bangladesh by masquerading as legitimate scholarship applications….

Hackers Exploit Email Marketing Platforms to Deliver Hidden Malware
01
Sep
2025

Hackers Exploit Email Marketing Platforms to Deliver Hidden Malware

In recent months, Trustwave SpiderLabs—a LevelBlue company renowned for its threat intelligence and incident response services—has observed a marked uptick…

Amazon Disrupts Russian APT29 Watering Hole Targeting Microsoft Authentication
01
Sep
2025

Amazon Disrupts Russian APT29 Watering Hole Targeting Microsoft Authentication

Amazon has disrupted a Russian APT29 watering hole campaign that used compromised sites to target Microsoft authentication with malicious redirects….