First AI Ransomware ‘PromptLock’ Uses OpenAI gpt-oss-20b Model for Encryption
26
Aug
2025

First AI Ransomware ‘PromptLock’ Uses OpenAI gpt-oss-20b Model for Encryption

A new ransomware has been identified, which is believed to be the first-ever ransomware strain that leverages a local AI…

Black Hat Ignites Under Vegas Lights
26
Aug
2025

Black Hat Ignites Under Vegas Lights

Driving through the quiet, endless beauty of the Nevada desert, I let the raspy voice of Jim Morrison carry me…

Securden Unified PAM Flaw Allows Attackers to Bypass Authentication
26
Aug
2025

Securden Unified PAM Flaw Allows Attackers to Bypass Authentication

Securden Unified PAM is a comprehensive privileged access management platform that is used to store, manage, and monitor credentials across…

Citrix Patches Three NetScaler Flaws, Confirms Active Exploitation of CVE-2025-7775
26
Aug
2025

Citrix Patches Three NetScaler Flaws, Confirms Active Exploitation of CVE-2025-7775

Aug 26, 2025Ravie LakshmananVulnerability / Remote Code Execution Citrix has released fixes to address three security flaws in NetScaler ADC…

Okta makes AI identity play with Axiom acquisition
26
Aug
2025

Okta makes AI identity play with Axiom acquisition

Identity technology supplier Okta is to acquire Axiom Security, a supplier of privileged access management (PAM) for cloud, database, software-as-a-service…

Tim Starks
26
Aug
2025

Court ruling in Epic-Google fight could have ‘catastrophic’ cyber consequences, former gov’t officials say

A court injunction in the long fight between Fortnite publisher Epic Games and Google could have “catastrophic results for the…

Nevada
26
Aug
2025

Nevada closes state offices as cyberattack disrupts IT systems

Nevada remains two days into a cyberattack that began early Sunday, disrupting government websites, phone systems, and online platforms, and…

How SOCs Triage Incidents in Seconds with Threat Intelligence
26
Aug
2025

How SOCs Triage Incidents in Seconds with Threat Intelligence

When every minute counts, it’s important to have access to fresh threat intelligence at the tip of your finger. That’s…

New Hook Android Banking Malware Emerges with Advanced Features and 107 Remote Commands
26
Aug
2025

New Hook Android Banking Malware Emerges with Advanced Features and 107 Remote Commands

Zimperium’s zLabs research team has identified a sophisticated new variant of the Hook Android banking trojan, marking a significant escalation…

77 Malicious Android Apps With 19M Downloads Targeted 831 Banks Worldwide
26
Aug
2025

77 Malicious Android Apps With 19M Installs Targeted 831 Banks Worldwide

Zscaler reports 77 Android apps on Google Play with 19 million installs spread malware, hitting 831 banks and exposing users…

AI-enabled security pushes down breach costs for UK organisations
26
Aug
2025

Three new Citrix NetScaler zero-days under active exploitation

Citrix has issued patches in order to fix three newly-designated common vulnerabilities and exposures (CVEs) in the widely used NetScaler…

CISA Warns of Git Arbitrary File Write Vulnerability Exploited in Attacks
26
Aug
2025

CISA Warns of Git Arbitrary File Write Vulnerability Exploited in Attacks

CISA has issued a high-severity warning for CVE-2025-48384, a link-following vulnerability in Git that enables arbitrary file writes via misconfigured…