Cybersecurity

Oracle Rushes Patch for CVE-2025-61882 After Cl0p Exploited It in Data Theft Attacks

Oct 06, 2025Ravie LakshmananVulnerability / Threat Intelligence Oracle has released an emergency update to address a critical security flaw in its E-Business Suite that it said has been exploited in...

Podcast #838 – Snapdragon X2 Elite Extreme, Another Unlikely Intel Investor, CRT Revivals, Brave Security, EA Buyout + MORE!

Matching up the audio this week for a change of pace!  That Snapdragon X2 Elite Extreme sometimes compares...

Level Up Your Dev Game: The Jules API is Here!

Ready to help turbocharge your workflow? We’re excited to introduce the Jules API—a new...

V/H/S Halloween directors say found-footage horror is still ‘hard AF’

The biggest exception to that rule is the ongoing V/H/S series, a horror anthology...
spot_img

Gamaredon X Turla collab

In this blogpost, we uncover the first known cases of collaboration between Gamaredon and Turla, in Ukraine. Key points of this...

Troy Hunt: Weekly Update 471

I'm so happy to finally be getting those HIBP demos out! The...

HeartCrypt’s wholesale impersonation effort – Sophos News

Over the past year and a bit more, we’ve monitored a constellation of events that share a set of general attributes: Malware impersonating, subverting, and...

Researchers Expose SVG and PureRAT Phishing Threats Targeting Ukraine and Vietnam

Sep 26, 2025Ravie LakshmananMalware / Cryptocurrency A new campaign has been observed impersonating Ukrainian government agencies in phishing attacks to deliver CountLoader, which is then...

What happens when a cybersecurity company gets phished? – Sophos News

If you work in cybersecurity, you’ve probably heard the time-honored adage about cyber attacks: “It’s not a matter of if, but when.” Perhaps a...

Kaspersky industrial threat report for Q2 2025

Statistics across all threats In Q2 2025, the percentage of ICS computers on which malicious objects were blocked decreased by 1.4 pp from the previous...
spot_img