Ivalo XE handset targets governments and security critical sectors, though Qualcomm silicon keeps it tied to the US Finnish phone maker HMD Global is launching a business unit called HMD Secure to target governments and other security-critical customers, and has…
Category: EN
Mitsubishi Electric to Acquire Nozomi Networks for Nearly $1 Billion
The industrial cybersecurity firm will become a wholly owned subsidiary of Mitsubishi Electric. The post Mitsubishi Electric to Acquire Nozomi Networks for Nearly $1 Billion appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article:…
Silobreaker Requirements enables teams to improve threat intelligence
Silobreaker has launched Requirements, a new way for threat intelligence (TI) teams to define, operationalize and measure Priority Intelligence Requirements (PIRs). The new capability combines a PIR library with integrated monitoring tools and performance metrics, covering use cases across cyber…
How Leading CISOs are Getting Budget Approval
It’s budget season. Once again, security is being questioned, scrutinized, or deprioritized. If you’re a CISO or security leader, you’ve likely found yourself explaining why your program matters, why a given tool or headcount is essential, and how the next…
New Malware Exploits Exposed Docker APIs to Gain Persistent Root SSH Access
The Akamai Hunt Team has uncovered a new strain of malware that targets exposed Docker APIs with expanded infection capabilities. First observed in August 2025 within Akamai’s honeypot infrastructure, this variant diverges from the June 2025 Trend Micro report by…
Finally, a Windows desktop I can confidently put away my iMac for
Lenovo’s Legion T5 is a powerhouse gaming desktop that delivers top-notch performance at a midrange price. But not everyone will love its physical design. This article has been indexed from Latest news Read the original article: Finally, a Windows desktop…
New Technique Uncovered To Exploit Linux Kernel Use-After-Free Vulnerability
A new technique to exploit a complex use-after-free (UAF) vulnerability in the Linux kernel successfully bypasses modern security mitigations to gain root privileges. The method targets CVE-2024-50264, a difficult-to-exploit race condition bug in the AF_VSOCK subsystem that was recognized with a Pwnie…
SpamGPT – AI-powered Attack Tool Used By Hackers For Massive Phishing Attack
A sophisticated new cybercrime toolkit named SpamGPT is enabling hackers to launch massive and highly effective phishing campaigns by combining artificial intelligence with the capabilities of professional email marketing platforms. Marketed on the dark web as a “spam-as-a-service” platform, SpamGPT…
Elastic Salesloft Drift Security Incident – Hackers Accessed Email Account Contains Valid Credentials
Elastic has disclosed a security incident stemming from a third-party breach at Salesloft Drift, which resulted in unauthorized access to an internal email account containing valid credentials. While the company’s core Salesforce environment was not impacted, the incident exposed sensitive…
Plex Urges Password Resets Following Data Breach
Hackers accessed emails, usernames, password hashes, and authentication data stored in a Plex database. The post Plex Urges Password Resets Following Data Breach appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: Plex Urges…
Differences Between Privileged Access Management and Enterprise Password Management
Understand the key differences between Privileged Access Management (PAM) and Enterprise Password Management (EPM) to enhance your organization’s security posture. The post Differences Between Privileged Access Management and Enterprise Password Management appeared first on Security Boulevard. This article has been…
Salesloft: GitHub Account Breach Was Ground Zero in Drift Campaign
Salesloft has revealed that threat actors targeted customer Salesforce data after breaching its GitHub account This article has been indexed from www.infosecurity-magazine.com Read the original article: Salesloft: GitHub Account Breach Was Ground Zero in Drift Campaign
Dell Cuts Staff In China Amidst Tensions
Dell Technologies reportedly carries out new round of layoffs in China after two rounds of previous cuts in recent weeks, as US tensions rise This article has been indexed from Silicon UK Read the original article: Dell Cuts Staff In…
Robot Maker Unitree Seeks $7bn Valuation In Upcoming IPO
Unitree, China’s biggest humanoid robot maker, is reportedly already profitable and seeks $7bn valuation in Shanghai IPO This article has been indexed from Silicon UK Read the original article: Robot Maker Unitree Seeks $7bn Valuation In Upcoming IPO
US Proposes Annual Licences For Samsung, SK Hynix Plants
US officials propose allowing Samsung, SK Hynix to request licences annually for equipment to maintain plants in China, in compromise offer This article has been indexed from Silicon UK Read the original article: US Proposes Annual Licences For Samsung, SK…
Jaguar Land Rover Halts Operations Longer Due to Cyberattack Impact
Jaguar Land Rover’s UK factories will remain closed until at least Wednesday as the company continues to recover from a cyberattack that struck its systems on 31 August. The carmaker shut down its IT networks in response to the breach,…
MostereRAT Exploits AnyDesk and TightVNC for Remote Access on Windows Systems
Cybersecurity researchers at FortiGuard Labs have uncovered a sophisticated phishing campaign that deploys the MostereRAT remote access trojan to compromise Windows systems. The malware leverages advanced evasion techniques and installs legitimate remote access tools like AnyDesk and TightVNC to maintain…
SentinelOne to Acquire Observo AI in $225 Million Deal
SentinelOne is buying Observo AI for a combination of cash and stock to boost its SIEM and data offerings. The post SentinelOne to Acquire Observo AI in $225 Million Deal appeared first on SecurityWeek. This article has been indexed from…
Dynatrace Data Breach Exposes Customer Information Stored in Salesforce
Dynatrace has confirmed that customer data stored in Salesforce was exposed following a third-party breach involving Salesloft’s Drift application. The incident, which occurred in August 2025, allowed unauthorized access to Salesforce CRM data across multiple companies. Both Salesloft and Salesforce…
New Exploitation Method Discovered for Linux Kernel Use-After-Free Vulnerability
A new exploitation method has been discovered for the Linux kernel use-after-free (UAF) vulnerability tracked as CVE-2024-50264. The vulnerability was awarded the Pwnie Award 2025 for Best Privilege Escalation due to its complexity and impact on major Linux distributions. Researchers developed innovative techniques…