A newly disclosed vulnerability in SAP NetWeaver AS ABAP and ABAP Platform (CVE-2025-42902) allows unauthenticated attackers to crash server processes by sending malformed SAP Logon or SAP Assertion Tickets. Rated Medium severity with a 5.3 CVSS 3.1 score, the flaw stems from a NULL…
British govt agents demand action after UK mega-cyberattacks surge 50%
Warn businesses to act now as high-severity incidents keep climbing Cyberattacks that meet upper severity thresholds set by the UK government’s cyber agents have risen 50 percent in the last year, despite almost zero change in the volume of cases…
RMPocalypse: New Attack Breaks AMD Confidential Computing
A vulnerability in RMP initialization allows the AMD processor’s x86 cores to maliciously control parts of the initial RMP state. The post RMPocalypse: New Attack Breaks AMD Confidential Computing appeared first on SecurityWeek. This article has been indexed from SecurityWeek…
CISO Conversations: Are Microsoft’s Deputy CISOs a Signpost to the Future?
SecurityWeek talks to Microsoft Deputy CISOs (dCISOs) Ann Johnson and Mark Russinovich. The post CISO Conversations: Are Microsoft’s Deputy CISOs a Signpost to the Future? appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article:…
Hackers Mimic as OpenAI and Sora Services to Steal Login Credentials
Hackers have launched a sophisticated phishing campaign impersonating both OpenAI and the recently released Sora 2 AI service. By cloning legitimate-looking landing pages, these actors are duping users into submitting their login credentials, participating in faux “gift” surveys, and even…
Astaroth Trojan Uses GitHub Images to Stay Active After Takedowns
Astaroth banking trojan has evolved to use GitHub and steganography for resilient C2, hiding its vital commands in images. Learn how this sophisticated malware employs fileless techniques to steal banking and crypto credentials from users across Latin America. This article…
Signal in the noise: what hashtags reveal about hacktivism in 2025
Kaspersky researchers identified over 2000 unique hashtags across 11,000 hacktivist posts on the surface web and the dark web to find out how hacktivist campaigns function and whom they target. This article has been indexed from Securelist Read the original…
Windows 10 Still on Over 40% of Devices as It Reaches End of Support
Users can continue receiving important security updates for Windows 10 by enrolling in the ESU program. The post Windows 10 Still on Over 40% of Devices as It Reaches End of Support appeared first on SecurityWeek. This article has been…
No Good Deed Goes Unpunished: Why Voluntary Disclosure of Cybersecurity Violations Doesn’t Mean You Won’t Be Punished for Bad Security
Voluntary cybersecurity disclosure reduces penalties but not liability. In compliance, honesty helps—but it’s no safe harbor. The post No Good Deed Goes Unpunished: Why Voluntary Disclosure of Cybersecurity Violations Doesn’t Mean You Won’t Be Punished for Bad Security appeared first…
UK Firms Lose Average of £2.9m to AI Risk
A new EY report claims unmanaged AI risk is causing millions of pounds’ worth of losses for UK organizations This article has been indexed from www.infosecurity-magazine.com Read the original article: UK Firms Lose Average of £2.9m to AI Risk
Wayve Discusses $2bn Funding Round With SoftBank, Microsoft
UK self-driving start-up Wayve reportedly in talks with SoftBank, Microsoft for funding round of up to $2bn that could value it at $8bn This article has been indexed from Silicon UK Read the original article: Wayve Discusses $2bn Funding Round…
SimonMed Data Breach Exposes Sensitive Information of 1.2 Million Patients
SimonMed Imaging has confirmed that an external hacking incident compromised the personal data of 1,275,669 patients, making it one of the largest healthcare breaches of the year. The breach, which occurred on January 21, 2025, but was not discovered until…
Unverified COTS hardware enables persistent attacks in small satellites via SpyChain
SpyChain shows how unverified COTS hardware in small satellites can enable persistent, multi-component supply chain attacks using NASA’s NOS3 simulator. The rise of small satellites has transformed scientific, commercial, and defense operations. Using commercial off-the-shelf (COTS) parts makes them cheaper…
Rethinking Microsoft Security: Why Identity is Your First Line of Defense
Identity is the new security perimeter. Defend Microsoft Entra ID and Microsoft 365 from evolving identity-based cyberattacks. The post Rethinking Microsoft Security: Why Identity is Your First Line of Defense appeared first on Security Boulevard. This article has been indexed…
Trade Fracas Fuels Biggest-Ever Crypto Crash
Drop in crypto prices last Friday, fuelled by trade war between US and China, was ‘largest liquidation event in crypto history’ This article has been indexed from Silicon UK Read the original article: Trade Fracas Fuels Biggest-Ever Crypto Crash
North Korean IT Workers Use VPNs and Laptop Farms to Evade Identity Verification
In a sprawling network of covert remote labor, more than 10,000 North Korean IT professionals have infiltrated global technology and freelance marketplaces by exploiting VPNs, virtual private servers (VPS), and so-called “laptop farms” to conceal their true origins. State-backed cyber…
UK: NCSC Reports 130% Spike in “Nationally Significant” Cyber Incidents
The UK cybersecurity agency reported 204 cyber incidents of “national significance” between September 2024 and August 2025 – an all-time high This article has been indexed from www.infosecurity-magazine.com Read the original article: UK: NCSC Reports 130% Spike in “Nationally Significant”…
Grindr Owners Launch Talks To Take Company Private
Majority owners of Grindr reportedly discussing taking dating app private after stock slump squeezes personal finances This article has been indexed from Silicon UK Read the original article: Grindr Owners Launch Talks To Take Company Private
Silicon UK In Focus Podcast: Speed to Customer
Discover how enterprises use predictive analytics and real-time data to anticipate customer needs, balance privacy, and deliver faster, smarter CX. This article has been indexed from Silicon UK Read the original article: Silicon UK In Focus Podcast: Speed to Customer
PoC Released for Sudo chroot Flaw Allowing Local Privilege Escalation
A new proof-of-concept (PoC) exploit has been published for a critical flaw in the widely used sudo utility. This vulnerability enables any local user to escape a chroot jail and execute commands with root privileges. Organizations relying on sudo are urged to audit and…
Oracle issued an emergency security update to fix new E-Business Suite flaw CVE-2025-61884
Oracle issued an emergency security update to address a new E-Business Suite (EBS) vulnerability tracked as CVE-2025-61884. Oracle released an emergency patch to address an information disclosure flaw, tracked as CVE-2025-61884 (CVSS Score of 7.5), in E-Business Suite’s Runtime UI component…
Elastic Cloud Enterprise Vulnerability Let Attackers Execute Malicious Commands
Elastic has disclosed a critical vulnerability in its Elastic Cloud Enterprise (ECE) platform that allows administrators with malicious intent to execute arbitrary commands and exfiltrate sensitive data. Tracked as CVE-2025-37729 under advisory ESA-2025-21, the flaw stems from improper neutralization of…
New PoC Exploit Released for Sudo Chroot Privilege Escalation Vulnerability
A critical vulnerability in the widely used Sudo utility has come under scrutiny following the public release of a proof-of-concept exploit, raising alarms for Linux system administrators worldwide. CVE-2025-32463 targets the chroot feature in Sudo versions 1.9.14 through 1.9.17, enabling…
IT Security News Hourly Summary 2025-10-14 09h : 9 posts
9 posts were published in the last hour 7:2 : Netherlands Takes Control Of China-Owned Nexperia 7:2 : Ivanti Patches 13 Endpoint Manager Flaws Allowing Remote Code Execution 7:2 : EU biometric border system launches, suffers teeting problems 7:2 :…