F5 BIG-IP Environment Breached by Nation-State Actor – Dark Reading
F5 disclosed a breach this week that included zero-day bugs, source code, and some customer information. – Read More
F5 disclosed a breach this week that included zero-day bugs, source code, and some customer information. – Read More
The Clop ransomware group claimed responsibility for stealing the university’s data as part of a broader campaign against Oracle customers. – Read More
Organizations across the continent saw 10% fewer attacks in September, but Africa remains the most attacked region in the world, leading the Global South. – Read More
October 2025’s enormous Patch Tuesday offers plenty of nightmares for admins, including actively exploited zero-days and insidious high-severity privilege-escalation bugs — and it spells curtains for Windows 10 updates. –…
Chinese APT threat actors compromised an organization’s ArcGIS server, modifying the widely used geospatial mapping software for stealth access. – Read More
The proof-of-concept exploit allows an attacker to steal sensitive data from Gmail, Google Accounts, Google Authenticator, Google Maps, Signal, and Venmo. – Read More
Despite daunting technical challenges, a quantum computer capable of breaking public-key encryption systems may only be a decade or two off. – Read More
OT and ICS systems indeed hold the crown jewels of critical infrastructure organizations, but unmonitored data sprawl is proving to be pure gold for increasingly brazen nation-state threat actors like…
With artificial intelligence supplanting entry-level security jobs, new cyber professionals will have to up their game to stay competitive in the industry. – Read More
Post Content – Read More
The security company looks to tackle new authentication challenges that could lead to credential leakage, as enterprises increasingly leverage AI browser agents. – Read More
RondoDox takes a hit-and-run, shotgun approach to exploiting bugs in consumer edge devices around the world. – Read More
Ransomware gangs continue to set their sights on the manufacturing industry, but companies are taking steps to protect themselves, starting with implementing timely patch management protocols. – Read More
The group warned that law-enforcement crackdowns are imminent in the wake of the takedown, but its extortion threats against Salesforce victims remain active. – Read More
In a new wrinkle for adversary tactics, the Storm-2603 threat group is abusing the digital forensics and incident response (DFIR) tool to gain persistent access to victim networks. – Read…