Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Keeping the internet afloat: How to protect the global cable network The resilience of the world’s submarine cable network is under new pressure from geopolitical…
Italy’s AI Law Comes Into Force
On October 10, 2025, Italy will become the first EU member state to bring a national artificial intelligence law into force, moving ahead of the bloc’s landmark EU AI Act. Law No. 132 of 2025, published in the Gazzetta Ufficiale…
IT Security News Hourly Summary 2025-10-05 06h : 3 posts
3 posts were published in the last hour 3:32 : Microsoft to Disable Inline SVG Images Display to Outlook for Web and Windows Users 3:32 : Unity Real-Time Development Platform Vulnerability Let Attackers Execute Arbitrary Code 3:31 : New WireTap…
Microsoft to Disable Inline SVG Images Display to Outlook for Web and Windows Users
Microsoft has announced a significant security enhancement for Outlook users, implementing the retirement of inline SVG image support across Outlook for Web and the new Outlook for Windows platforms. This change represents a proactive measure to strengthen email security infrastructure…
Unity Real-Time Development Platform Vulnerability Let Attackers Execute Arbitrary Code
Unity Technologies has issued a critical security advisory warning developers about a high-severity vulnerability affecting its widely used game development platform. The flaw, designated CVE-2025-59489, exposes applications built with vulnerable Unity Editor versions to unsafe file loading attacks that could…
New WireTap Attack Break Server SGX To Exfiltrate Sensitive Data
A newly disclosed vulnerability, named the WireTap attack, allows attackers with physical access to break the security of Intel’s Software Guard eXtensions (SGX) on modern server processors and steal sensitive information. A research paper released in October 2025 details how…
IT Security News Hourly Summary 2025-10-05 00h : 1 posts
1 posts were published in the last hour 22:55 : IT Security News Daily Summary 2025-10-04
IT Security News Daily Summary 2025-10-04
37 posts were published in the last hour 20:31 : GreyNoise detects 500% surge in scans targeting Palo Alto Networks portals 20:5 : IT Security News Hourly Summary 2025-10-04 21h : 1 posts 19:31 : USENIX 2025: PEPR ’25 –…
Ensuring Certainty in Identity Security
How Do Non-Human Identities Shape Identity Security in the Digital Landscape? Imagine where non-human identities (NHIs) dictate the security of your data. With machines performing a vast array of tasks autonomously, ensuring their identities are as secure as their human…
Innovations in Machine Identity Management
How Secure Are Your Machine Identities in Today’s Digital Landscape? Managing machine identities and their security is increasingly critical as businesses continue to migrate vast amounts of data to the cloud. Each machine identity, much like a human passport, needs…
Can You Trust Your Cloud Security Measures?
What Are Non-Human Identities (NHIs) and Why Are They Critical to Cloud Security? With businesses move their operations to the cloud, how can they be certain that their cloud security measures are robust enough? The key might lie in understanding…
Does Your NHI Strategy Deliver Value?
What Makes NHI Management a Must-Have for Your Business? Have you ever wondered how machine identities are reshaping cybersecurity frameworks? Non-human identities (NHIs), composed of machine identities, are increasingly pivotal. These machine identities, often unseen yet omnipresent, require a robust…
GreyNoise detects 500% surge in scans targeting Palo Alto Networks portals
GreyNoise saw a 500% spike in scans on Palo Alto Networks login portals on Oct. 3, 2025, the highest in three months. Cybersecurity firm GreyNoise reported a 500% surge in scans targeting Palo Alto Networks login portals on October 3,…
IT Security News Hourly Summary 2025-10-04 21h : 1 posts
1 posts were published in the last hour 18:32 : Anker offered Eufy camera owners $2 per video for AI training
USENIX 2025: PEPR ’25 – Verifying Humanness: Personhood Credentials For The Digital Identity Crisis
Creator, Author and Presenter: Tanusree Sharma, Pennsylvania State University Our thanks to USENIX for publishing their Presenter’s outstanding USENIX Enigma ’23 Conference content on the organization’s’ YouTube channel. Permalink The post USENIX 2025: PEPR ’25 – Verifying Humanness: Personhood Credentials…
Anker offered Eufy camera owners $2 per video for AI training
Hundreds of Eufy customers have donated hundreds of thousands of videos to train the company’s AI systems. This article has been indexed from Security News | TechCrunch Read the original article: Anker offered Eufy camera owners $2 per video for…
Red Hat Confirms Breach of GitLab Instance Linked to Consulting Team
Red Hat has acknowledged a cybersecurity incident involving one of its GitLab instances after a hacker group calling itself Crimson Collective claimed to have stolen a significant amount of company data. The enterprise software provider clarified that the breach…
IT Security News Hourly Summary 2025-10-04 18h : 2 posts
2 posts were published in the last hour 16:2 : Event startup Partiful wasn’t stripping GPS locations from user-uploaded photos 15:32 : CometJacking: One Click Can Turn Perplexity’s Comet AI Browser Into a Data Thief
Phishing Campaign Uses Fake PyPI Domain to Steal Login Credentials
Phishing campaign via fake domains A highly advanced phishing campaign targeted maintainers of packages on the Python Package Index (PyPI), utilizing domain confusion methods to obtain login credentials from unsuspecting developers. The campaign leverages fake emails made to copy authentic…
FBI Warns Against Screen Sharing Amid Rise in “Phantom Hacker” Scam
The Federal Bureau of Investigation (FBI) has issued an urgent alert about a fast-spreading scam in which cybercriminals gain access to victims’ devices through screen-sharing features, allowing them to steal money directly from bank accounts. Known as the “phantom…
Discord Data Breach: Hackers Access IDs, Billing Details and Support Chats
Discord confirms a data breach via a third-party vendor, exposing government-issued photo IDs, names, emails, and limited billing data of users who contacted customer support. Learn the full risk. This article has been indexed from Hackread – Latest Cybersecurity, Hacking…
U.S. CISA adds Smartbedded Meteobridge, Samsung, Juniper ScreenOS, Jenkins, and GNU Bash flaws to its Known Exploited Vulnerabilities catalog
U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Smartbedded Meteobridge, Samsung, Juniper ScreenOS, Jenkins, and GNU Bash flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added Smartbedded Meteobridge, Samsung, Juniper ScreenOS, Jenkins, and GNU…
Event startup Partiful wasn’t stripping GPS locations from user-uploaded photos
The event planning startup, which has raised over $27M from a16z and others, fixed the bug after TechCrunch found that Partiful was not removing granular location data from users’ profile photos. This article has been indexed from Security News |…
CometJacking: One Click Can Turn Perplexity’s Comet AI Browser Into a Data Thief
Cybersecurity researchers have disclosed details of a new attack called CometJacking targeting Perplexity’s agentic AI browser Comet by embedding malicious prompts within a seemingly innocuous link to siphon sensitive data, including from connected services, like email and calendar. The sneaky…