Investigations found that the network operates scam centers in Cambodia, Myanmar and across Southeast Asia This article has been indexed from www.infosecurity-magazine.com Read the original article: UK, US Sanction Southeast Asia-Based Online Scam Network
Capita Fined £14m After 2023 Breach that Hit 6.6 Million People
Outsourcing giant Capita has been fined £14m by the ICO after a major data breach in 2023 This article has been indexed from www.infosecurity-magazine.com Read the original article: Capita Fined £14m After 2023 Breach that Hit 6.6 Million People
Robotaxi Firms Pony.ai, WeRide Set For Hong Kong IPOs
US-listed Chinese autonomous taxi firms Pony.ai, WeRide gain regulatory approval for secondary offerings in Hong Kong amidst expansion This article has been indexed from Silicon UK Read the original article: Robotaxi Firms Pony.ai, WeRide Set For Hong Kong IPOs
Flax Typhoon APT exploited ArcGIS server for over a year as a backdoor
China-linked cyberespionage group Flax Typhoon hijacked an ArcGIS system for over a year and used it as a backdoor. China-linked APT group Flax Typhoon (aka Ethereal Panda or RedJuliett) compromised an ArcGIS system for over a year, using it as…
Unencrypted satellites expose global communications
Researchers found nearly half of geostationary satellites leak unencrypted data, exposing consumer, corporate, and military communications. A group of researchers from UC San Diego and the University of Maryland found nearly half of geostationary satellites transmit unencrypted data, exposing sensitive…
Netcraft launches Phone Scam Disruption to stop brand impersonation calls and texts
Netcraft unveiled a new solution to help protect organizations’ customers from scam texts and phone calls that impersonate their brand. Netcraft’s Phone Scam Disruption automates the detection and takedown of fraudulent phone numbers used in impersonation scam campaigns, shutting down…
New Cranium AI features enhance compliance, security, and agentic AI scalability
Cranium AI released several new agentic AI capabilities and featured releases to its AI Governance and Security Platform. These new products and capabilities are designed to enable enterprises to scale faster with AI agents, streamline compliance and fortify AI systems…
New BarracudaONE features streamline MSP operations and strengthen multi-tenant security
Barracuda Networks unveiled enhancements to its AI-powered BarracudaONE platform. New capabilities, including bulk remediation for email threats, PSA integrations for automated billing and invoicing, and streamlined account management, are purpose-built for managed service providers (MSPs), helping them accelerate security across…
IT Security News Hourly Summary 2025-10-15 09h : 11 posts
11 posts were published in the last hour 7:2 : Government Warns Businesses As Major Cyber-Attacks Surge 7:2 : Cybersecurity Habits That Changed My Family 7:2 : Chrome Use After Free Vulnerability Let Attackers Execute Arbitrary Code 7:2 : Windows…
Google To Invest $15bn In Indian AI Hub
Google to spend $15bn over five years to build AI hub in south-eastern India, including data centre, subsea data link This article has been indexed from Silicon UK Read the original article: Google To Invest $15bn In Indian AI Hub
Instagram To Apply PG-13 Restrictions To Teen Accounts
Meta’s Instagram to restrict content shown to accounts for youths under 18, as it faces pressure to show it is not prioritising profits This article has been indexed from Silicon UK Read the original article: Instagram To Apply PG-13 Restrictions…
High-Severity Vulnerabilities Patched by Fortinet and Ivanti
Fortinet and Ivanti have announced their October 2025 Patch Tuesday updates, which patch many vulnerabilities across their products. The post High-Severity Vulnerabilities Patched by Fortinet and Ivanti appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…
RGS IC Cloud Support enables Kubernetes management in restricted cloud environments
Rancher Government Solutions (RGS) announced the launch and general availability of IC Cloud Support, a new capability purpose-built for government and military teams operating in classified cloud environments. IC Cloud Support allows organizations working in airgapped or restricted regions of…
Red Hat AI 3 helps enterprises scale AI workloads across hybrid environments
Red Hat released Red Hat AI 3, an evolution of its enterprise AI platform. Bringing together the latest innovations from Red Hat AI Inference Server, Red Hat Enterprise Linux AI (RHEL AI), and Red Hat OpenShift AI, the platform simplifies…
Hackers Target ICTBroadcast Servers via Cookie Exploit to Gain Remote Shell Access
Cybersecurity researchers have disclosed that a critical security flaw impacting ICTBroadcast, an autodialer software from ICT Innovations, has come under active exploitation in the wild. The vulnerability, assigned the CVE identifier CVE-2025-2611 (CVSS score: 9.3), relates to improper input validation…
Two CVSS 10.0 Bugs in Red Lion RTUs Could Hand Hackers Full Industrial Control
Cybersecurity researchers have disclosed two critical security flaws impacting Red Lion Sixnet remote terminal unit (RTU) products that, if successfully exploited, could result in code execution with the highest privileges. The shortcomings, tracked as CVE-2023-40151 and CVE-2023-42770, are both rated…
Chinese Hackers Use Geo-Mapping Tool for Year-Long Persistence
The China-backed advanced persistent threat group Flax Typhoon maintained year-long access to an ArcGIS system by turning trusted software into a persistent backdoor—an attack so unique it prompted the vendor to update its documentation. The attackers repurposed a legitimate Java…
U.S. seizes $15 billion in Bitcoin linked to massive forced-labor crypto scam
The U.S. government has seized about $15 billion worth of Bitcoin connected to what prosecutors call one of the largest cryptocurrency fraud and human trafficking operations ever uncovered. Federal prosecutors in Brooklyn have charged Chen Zhi, also known as “Vincent,”…
Corelight unveils AWS Flow Monitoring to eliminate cloud blind spots
Corelight launched Flow Monitoring for AWS environments, expanding network visibility across cloud and on-premises ecosystems through comprehensive analysis of flow data. This new capability addresses critical challenges facing security operations (SOC) teams by delivering visibility across AWS Virtual Private Cloud…
Legacy Windows protocols expose theft, Fortra admits GoAnywhere defect, Taiwan claims surge in Chinese attacks
Legacy Windows protocols still expose theft Fortra admits exploitation of GoAnywhere defect Taiwan claims surge in Chinese attack efforts Huge thanks to our sponsor, Vanta What’s your 2 AM security worry? Is it “Do I have the right controls…
Government Warns Businesses As Major Cyber-Attacks Surge
Government tells business chiefs to have pen-and-paper backup plans readily accessible as nationally significant cyber-attacks double This article has been indexed from Silicon UK Read the original article: Government Warns Businesses As Major Cyber-Attacks Surge
Cybersecurity Habits That Changed My Family
Small habits like pausing before clicks and using MFA can protect families. Learn how awareness creates safer digital lives. The post Cybersecurity Habits That Changed My Family appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet…
Chrome Use After Free Vulnerability Let Attackers Execute Arbitrary Code
Google has rolled out an urgent security update for its Chrome browser, addressing a high-severity use-after-free vulnerability that could allow attackers to execute arbitrary code on users’ systems. The patch is included in version 141.0.7390.107 for Linux and 141.0.7390.107/.108 for…
Windows Remote Desktop Client Vulnerability Let Attackers Execute Remote Code
Microsoft has patched a critical flaw in its Remote Desktop Client that could allow attackers to execute malicious code on victims’ systems. Disclosed on October 14, 2025, as CVE-2025-58718, the vulnerability stems from a use-after-free error, earning an “Important” severity…