Category: EN

Canada Finds TikTok Child Protections Inadequate

Canadian probe finds hundreds of thousands of under-13s on platform, children’s data harvested for targeted advertising This article has been indexed from Silicon UK Read the original article: Canada Finds TikTok Child Protections Inadequate

Cyber-Attack Costs Co-op £206m In Lost Revenues

Co-op says cyber-attack earlier this year cost at least £206m in lost revenues and resulted in loss for first half of 2025 This article has been indexed from Silicon UK Read the original article: Cyber-Attack Costs Co-op £206m In Lost…

New XCSSET Malware Variant Targets macOS App Developers

Cybersecurity researchers have discovered an advanced variant of the XCSSET malware specifically targeting macOS developers through infected Xcode projects, introducing sophisticated clipboard hijacking and enhanced data exfiltration capabilities. Microsoft Threat Intelligence has identified yet another XCSSET variant in the wild…

AI Shadow Leak Avoids Detection

Cybersecurity Today: Shadow Leak, SIM Farm Shutdown, Cisco Zero-Day, FBI Warning & Android Advanced Protection In this episode of Cybersecurity Today, host Jim Love discusses several major cybersecurity issues. Key topics include the discovery of the ‘Shadow Leak’ vulnerability in…

How to Enable MFA Before RDP and SSH Sessions

Remote access is essential for modern enterprises. IT administrators, DevOps teams, and vendors need to connect to critical infrastructure using Remote Desktop Protocol (RDP) or Secure Shell (SSH). But many organizations still allow these sessions without enforcing a critical security…

Inside the economy built on stolen credentials

Instead of going after software flaws or network weaknesses, attackers are targeting something much easier to steal: identity credentials. A new report from BeyondID calls this growing black market the identity economy, where usernames, passwords, tokens, and access rights are…

LockBit 5.0 Ransomware Targets Windows, Linux, and VMware ESXi Systems

Cybersecurity researchers at Trend Micro have discovered a new and dangerous variant of LockBit ransomware that targets Windows, Linux, and VMware ESXi systems, utilizing advanced obfuscation techniques and sophisticated cross-platform capabilities. Advanced Multi-Platform Attack Strategy LockBit 5.0 represents a significant…

Salesforce AI Agent Vulnerability Lets Attackers Steal Sensitive Data

Cybersecurity researchers at Noma Labs have discovered a critical vulnerability in Salesforce’s Agentforce AI platform that could allow attackers to steal sensitive customer data through sophisticated prompt injection techniques. The vulnerability, dubbed “ForcedLeak,” carries a CVSS score of 9.4, indicating…

New Phishing Attack Targeting PyPI Maintainers to Steal Login Credentials

A sophisticated phishing campaign has emerged targeting maintainers of packages on the Python Package Index (PyPI), employing domain confusion tactics to steal authentication credentials from unsuspecting developers. The attack leverages fraudulent emails designed to mimic official PyPI communications, directing recipients…

How agentic AI is changing the SOC

In this Help Net Security video, David Norlin, CTO of Lumifi, explores the role of agentic AI in the security operations center (SOC). He explains what agentic AI is, how it can enhance cybersecurity workflows by automating repetitive tasks, and…

Threat Actors Using Copyright Takedown Claims to Deploy Malware

A sophisticated malware campaign orchestrated by the Vietnamese Lone None threat actor group has been leveraging fraudulent copyright infringement takedown notices to deploy information-stealing malware onto unsuspecting victims’ systems. The campaign, which has been actively tracked since November 2024, represents…

Infosec products of the month: September 2025

Here’s a look at the most interesting products from the past month, featuring releases from: Absolute Security, Blackdot Solutions, Catchpoint, Cynomi, DataLocker, Gigamon, Lookout, Nagomi Security, Neon Cyber, QuSecure, Relyance AI, Secure Code Warrior, and Teleport. Cynomi simplifies vendor risk…