Attacker Context and Historical iOS Zero-Click Similarities
28
Aug
2025

Attacker Context and Historical iOS Zero-Click Similarities

Apple has issued emergency security updates across its entire ecosystem to address CVE-2025-43300, a critical zero-day vulnerability in the ImageIO framework that…

DTA trials AI to assist Digital Marketplace application reviews
27
Aug
2025

DTA trials AI to assist Digital Marketplace application reviews

The federal government is set to pilot the use of artificial intelligence to help review applications for its Digital Marketplace…

27
Aug
2025

A Better Way to Think About AI Job Replacement

You don’t have to believe that companies want to fire all their employees to see AI’s threat to jobs. That’s…

Tim Starks
27
Aug
2025

Salt Typhoon hacking campaign goes beyond previously disclosed targets, world cyber agencies say

A notorious Chinese hacking campaign against telecommunications companies has now reached into a variety of additional sectors across the globe,…

NVIDIA NeMo AI Curator Enables Code Execution and Privilege Escalation
27
Aug
2025

NVIDIA NeMo AI Curator Enables Code Execution and Privilege Escalation

NVIDIA has issued a critical security bulletin addressing a high-severity vulnerability in its NeMo Curator platform that could allow attackers…

Critical Zip Slip Bug Enables Malicious File Manipulation on Unzip
27
Aug
2025

Critical Zip Slip Bug Enables Malicious File Manipulation on Unzip

Path traversal flaws like Zip Slip, which give hackers the ability to alter file systems while decompressing, remain a serious…

Scammers Steal $1 Million in Crypto Using Fake Delta and AMC Sites
27
Aug
2025

Scammers Steal $1 Million in Crypto Using Fake Delta and AMC Sites

Cybersecurity firm Netcraft has discovered a new task scam cluster that has stolen over $1 million in crypto. The scammers…

Storm-0501 Exploits Entra ID to Exfiltrate and Delete Azure Data in Hybrid Cloud Attacks
27
Aug
2025

Storm-0501 Exploits Entra ID to Exfiltrate and Delete Azure Data in Hybrid Cloud Attacks

The financially motivated threat actor known as Storm-0501 has been observed refining its tactics to conduct data exfiltration and extortion…

Over 28,000 Citrix instances remain exposed to critical RCE flaw CVE-2025-7775
27
Aug
2025

Over 28,000 Citrix instances remain exposed to critical RCE flaw CVE-2025-7775

Over 28,000 Citrix instances remain exposed to critical RCE flaw CVE-2025-7775 Pierluigi Paganini August 27, 2025 Over 28,200 Citrix NetScaler…

The Chinese Room Problem With the 'LLMs only predict the next token' Argument
27
Aug
2025

The Chinese Room Problem With the ‘LLMs only predict the next token’ Argument

I’m sure you’ve heard the argument that LLMs aren’t really thinking because, according to them, LLMs are just predicting the…

FreePBX
27
Aug
2025

FreePBX servers hacked via zero-day, emergency fix released

The Sangoma FreePBX Security Team is warning about an actively exploited FreePBX zero-day vulnerability that impacts systems with the Administrator…

How ClickFix and Multi-Stage Frameworks Are Breaking Enterprise Defenses
27
Aug
2025

How ClickFix and Multi-Stage Frameworks Are Breaking Enterprise Defenses

August 2025 has marked a significant evolution in cybercrime tactics, with threat actors deploying increasingly sophisticated phishing frameworks and social…