Cybersecurity and other IT news aggregator

LATEST FEEDS

  • Warnings about Cisco vulns under active exploit are falling on deaf ears

    Warnings about Cisco vulns under active exploit are falling on deaf ears 2025-09-30 at 19:26 By Connor Jones 50,000 firewall devices still exposed Nearly 50,000 Cisco ASA/FTD instances vulnerable to two bugs that are actively being exploited by “advanced” attackers remain exposed to the internet, according to Shadowserver data.… This article is an excerpt from…


  • SEC weighs plan to allow blockchain-based stock trading amid crypto push: Report

    SEC weighs plan to allow blockchain-based stock trading amid crypto push: Report 2025-09-30 at 19:04 By Cointelegraph by Sam Bourgi The SEC is exploring a plan to let blockchain-based versions of stocks trade on crypto exchanges, signaling growing support for tokenization. This article is an excerpt from Cointelegraph.com News View Original Source React to this…


  • CISA says it will fill the gap as some federal funding for MS-ISAC dries up

    CISA says it will fill the gap as some federal funding for MS-ISAC dries up 2025-09-30 at 18:45 By Zeljka Zorz The cooperative agreement between the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the not-for-profit Center for Internet Security is ending today, the agency has announced on Monday, and CISA will take it upon…


  • Call for Presentations Open for 2025 CISO Forum Virtual Summit

    Call for Presentations Open for 2025 CISO Forum Virtual Summit 2025-09-30 at 18:45 By SecurityWeek News This online event is expected to attract more than 2,500 attendee registrations from around the world. The post Call for Presentations Open for 2025 CISO Forum Virtual Summit appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View…


  • Google Patches Gemini AI Hacks Involving Poisoned Logs, Search Results

    Google Patches Gemini AI Hacks Involving Poisoned Logs, Search Results 2025-09-30 at 18:45 By Eduard Kovacs Researchers found more methods for tricking an AI assistant into aiding sensitive data theft. The post Google Patches Gemini AI Hacks Involving Poisoned Logs, Search Results appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original…


  • Passenger lands in hospital after humiliating TSA spat over stubborn jewelry 

    Passenger lands in hospital after humiliating TSA spat over stubborn jewelry  2025-09-30 at 18:45 By Ben Cost “Anything that has a battery that also goes on your body should be made super easy to take off, in case of battery expansion.” This article is an excerpt from Latest Technology News | New York Post View…


  • Pop! System76’s 24.04 beta is here – complete with a beta of polarizing COSMIC

    Pop! System76’s 24.04 beta is here – complete with a beta of polarizing COSMIC 2025-09-30 at 18:22 By Liam Proven Twice the betas and twice the crashes means twice the fun, right? It’s September 2025 and the beta of the April 2024 release of Pop!_OS is here. It’s fast, fluid – and fallible.… This article…


  • Did Bitcoin just finish its 8-week delay in copying gold’s all-time highs?

    Did Bitcoin just finish its 8-week delay in copying gold’s all-time highs? 2025-09-30 at 18:05 By Cointelegraph by William Suberg Bitcoin traded revealed that BTC price action could be ready to follow gold to new all-time highs after bulls held onto early-week gains. This article is an excerpt from Cointelegraph.com News View Original Source React…


  • James Wynn’s big wins (and losses): The truth about trading with leverage

    James Wynn’s big wins (and losses): The truth about trading with leverage 2025-09-30 at 17:55 By Cointelegraph by Tobias Vilkenson James Wynn’s high-leverage bets on Bitcoin and memecoins turned him into one of crypto’s most-watched traders, with both wins and wipeouts. This article is an excerpt from Cointelegraph.com News View Original Source React to this…


  • Logitech’s MX Master 4 mouse buzzes with haptic feedback but lacks lefty love

    Logitech’s MX Master 4 mouse buzzes with haptic feedback but lacks lefty love 2025-09-30 at 17:38 By Richard Speed Ergonomic, feature-packed, and still right-handed only (Right) Hands On  Logitech has unveiled its latest MX Master mouse, filled with impressive new productivity features, including an added button and haptic feedback. However, like most mice on the…


  • Ivanti upgrades Connect Secure with hardened system and gateway improvements

    Ivanti upgrades Connect Secure with hardened system and gateway improvements 2025-09-30 at 17:36 By Industry News Ivanti released Ivanti Connect Secure (ICS) version 25.X. The update includes a modernized enterprise-grade OS, platform hardening, and gateway enhancements designed to reduce vulnerabilities, shrink attack surfaces, and improve resilience. Enterprise security is central to Connect Secure 25.X. Many…


  • Legit’s Command Center tracks AI code, models, and MCP server usage across the SDLC

    Legit’s Command Center tracks AI code, models, and MCP server usage across the SDLC 2025-09-30 at 17:36 By Industry News Legit Security has updated its AI Security Command Center. As vibe coding and AI-first development reshape how software is built, the Command Center offers visibility into when, where, and how AI-generated code, AI models, and…


  • Researchers Disclose Google Gemini AI Flaws Allowing Prompt Injection and Cloud Exploits

    Researchers Disclose Google Gemini AI Flaws Allowing Prompt Injection and Cloud Exploits 2025-09-30 at 17:23 By Cybersecurity researchers have disclosed three now-patched security vulnerabilities impacting Google’s Gemini artificial intelligence (AI) assistant that, if successfully exploited, could have exposed users to major privacy risks and data theft. “They made Gemini vulnerable to search-injection attacks on its…


  • Microsoft Expands Sentinel Into Agentic Security Platform With Unified Data Lake

    Microsoft Expands Sentinel Into Agentic Security Platform With Unified Data Lake 2025-09-30 at 17:23 By Microsoft on Tuesday unveiled the expansion of its Sentinel Security Incidents and Event Management solution (SIEM) as a unified agentic platform with the general availability of the Sentinel data lake. In addition, the tech giant said it’s also releasing a…


  • Stop Alert Chaos: Context Is the Key to Effective Incident Response

    Stop Alert Chaos: Context Is the Key to Effective Incident Response 2025-09-30 at 17:23 By The Problem: Legacy SOCs and Endless Alert Noise Every SOC leader knows the feeling: hundreds of alerts pouring in, dashboards lighting up like a slot machine, analysts scrambling to keep pace. The harder they try to scale people or buy…


  • Urgent: China-Linked Hackers Exploit New VMware Zero-Day Since October 2024

    Urgent: China-Linked Hackers Exploit New VMware Zero-Day Since October 2024 2025-09-30 at 17:23 By A newly patched security flaw impacting Broadcom VMware Tools and VMware Aria Operations has been exploited in the wild as a zero-day since mid-October 2024 by a threat actor called UNC5174, according to NVISO Labs. The vulnerability in question is CVE-2025-41244…


  • Zed’s dead, baby. Zed’s dead? No, wait – it’s on Windows

    Zed’s dead, baby. Zed’s dead? No, wait – it’s on Windows 2025-09-30 at 16:25 By Tim Anderson Rust-coded editor beta arrives with general availability promised in October Zed Industries has released a public beta of its code editor for Windows, marking a significant milestone for the Rust-based VS Code alternative that has until now been…


  • ServiceNow thinks you’re doing AI fast and wrong

    ServiceNow thinks you’re doing AI fast and wrong 2025-09-30 at 16:01 By Simon Sharwood And of course thinks it can help you do it right, once it gets around to delivering Three weeks after releasing one of its biannual platform upgrades, ServiceNow has started delivering an “AI Experience.”… This article is an excerpt from The…


  • SpiderLabs Ransomware Tracker Update September 2025: Qilin, Akira Top Ransomware Attackers

    SpiderLabs Ransomware Tracker Update September 2025: Qilin, Akira Top Ransomware Attackers 2025-09-30 at 16:00 By The threat groups Qilin and Akira together conducted about one-quarter of the 402 ransomware attacks tracked by Trustwave SpiderLabs in September, with the manufacturing and technology sectors receiving the brunt of these efforts. This article is an excerpt from Trustwave…


  • From Folding to Folded: Hacking High Volume Mailer Machines

    From Folding to Folded: Hacking High Volume Mailer Machines 2025-09-30 at 16:00 By John Jackson The Quadient DS-700iQ is a high-volume folder-inserter machine designed for automating the process of assembling, folding, and inserting mail into envelopes for large mailing operations. It features a modular design that can handle complex mailing jobs, supports multiple feeders and…


  • Acronis brings patch management to consumer backup software

    Acronis brings patch management to consumer backup software 2025-09-30 at 15:56 By Industry News Acronis announced the general availability of Acronis True Image 2026, the new release of its natively integrated backup and security software for consumers and small businesses. The latest version introduces built-in patch management for Windows and a strengthened security engine with…


  • Mondoo Raises $17.5 Million for Vulnerability Management Platform

    Mondoo Raises $17.5 Million for Vulnerability Management Platform 2025-09-30 at 15:37 By Eduard Kovacs Mondoo has raised more than $32 million in total, with the latest funding round led by HV Capital.  The post Mondoo Raises $17.5 Million for Vulnerability Management Platform appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original…


  • CISO Conversations: John ‘Four’ Flynn, VP of Security at Google DeepMind

    CISO Conversations: John ‘Four’ Flynn, VP of Security at Google DeepMind 2025-09-30 at 15:15 By Kevin Townsend Flynn has been DeepMind’s VP of security since May 2024. Before then he had been a CISO with Amazon, CISO at Uber, and director of information security at Facebook. The post CISO Conversations: John ‘Four’ Flynn, VP of…


  • NASA’s deep-space laser comms demo has left the chat

    NASA’s deep-space laser comms demo has left the chat 2025-09-30 at 15:12 By Richard Speed DSOC hit record speeds beaming data from Psyche before going dark NASA’s Deep Space Optical Communications (DSOC) demonstration has completed its final pass, although there is a chance the system might be reactivated in the second half of 2026.… This…


  • New Guidance Calls on OT Operators to Create Continually Updated System Inventory

    New Guidance Calls on OT Operators to Create Continually Updated System Inventory 2025-09-30 at 15:06 By Eduard Kovacs Agencies in several countries have created guidance titled ‘Creating and Maintaining a Definitive View of Your OT Architecture’. The post New Guidance Calls on OT Operators to Create Continually Updated System Inventory appeared first on SecurityWeek. This…


  • Webinar: The BAS Summit 2025: Redefining Attack Simulation through AI

    Webinar: The BAS Summit 2025: Redefining Attack Simulation through AI 2025-09-30 at 15:00 By Help Net Security Join Picus Security, SANS, Hacker Valley, and leading CISOs at The BAS Summit 2025 to learn how AI is redefining Breach and Attack Simulation (BAS) and why it’s becoming the new benchmark for cyber resilience. Attend the webinar…


  • New Android Trojan “Datzbro” Tricking Elderly with AI-Generated Facebook Travel Events

    New Android Trojan “Datzbro” Tricking Elderly with AI-Generated Facebook Travel Events 2025-09-30 at 14:54 By Cybersecurity researchers have flagged a previously undocumented Android banking trojan called Datzbro that can conduct device takeover (DTO) attacks and perform fraudulent transactions by preying on the elderly. Dutch mobile security company ThreatFabric said it discovered the campaign in August…


  • California Gov. Gavin Newsom Signs Bill Creating AI Safety Measures

    California Gov. Gavin Newsom Signs Bill Creating AI Safety Measures 2025-09-30 at 14:53 By Mike Lennon The Transparency in Frontier Artificial Intelligence Act (TFAIA) requires AI companies to implement and disclose publicly safety protocols to prevent their most advanced models from being used to cause major harm. The post California Gov. Gavin Newsom Signs Bill…


  • High-Severity Vulnerabilities Patched in VMware Aria Operations, NSX, vCenter 

    High-Severity Vulnerabilities Patched in VMware Aria Operations, NSX, vCenter  2025-09-30 at 14:33 By Ionut Arghire The flaws could allow attackers to escalate privileges, manipulate notifications, and enumerate usernames. The post High-Severity Vulnerabilities Patched in VMware Aria Operations, NSX, vCenter  appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to…


  • Western Digital My Cloud NAS devices vulnerable to unauthenticated RCE (CVE-2025-30247)

    Western Digital My Cloud NAS devices vulnerable to unauthenticated RCE (CVE-2025-30247) 2025-09-30 at 14:11 By Zeljka Zorz Western Digital has fixed a critical remote code execution vulnerability (CVE-2025-30247) in the firmware powering its My Cloud network-attached storage (NAS) devices, and has urged users to upgrade as soon as possible. About CVE-2025-30247 Western Digital’s My Cloud…


  • Evolving Enterprise Defense to Secure the Modern AI Supply Chain

    Evolving Enterprise Defense to Secure the Modern AI Supply Chain 2025-09-30 at 13:03 By The world of enterprise technology is undergoing a dramatic shift. Gen-AI adoption is accelerating at an unprecedented pace, and SaaS vendors are embedding powerful LLMs directly into their platforms. Organizations are embracing AI-powered applications across every function, from marketing and development…


  • U.K. Police Just Seized £5.5 Billion in Bitcoin — The World’s Largest Crypto Bust

    U.K. Police Just Seized £5.5 Billion in Bitcoin — The World’s Largest Crypto Bust 2025-09-30 at 13:03 By A Chinese national has been convicted for her role in a fraudulent cryptocurrency scheme after law enforcement authorities in the U.K. confiscated £5.5 billion (about $7.39 billion) during a raid of her home in London. The cryptocurrency…


  • Greg Kroah-Hartman explains the Cyber Resilience Act for open source developers

    Greg Kroah-Hartman explains the Cyber Resilience Act for open source developers 2025-09-30 at 11:04 By Steven J. Vaughan-Nichols Impact? Nope, don’t worry, be happy, says Linux veteran Opinion  There has been considerable worry about the impact of the European Union’s Cyber Resilience Act on open source programmers. Linux stable kernel maintainer Greg Kroah-Hartman says, however,…


  • AI upstart aims to do what mere mortals can’t: Make sense of Microsoft licensing

    AI upstart aims to do what mere mortals can’t: Make sense of Microsoft licensing 2025-09-30 at 10:43 By Richard Speed Thankfully, Onyx’s model also knows when to defer to a human for advice Interview  It was inevitable that AI would be deployed to help enterprises navigate the labyrinth that is modern software licensing, given the…


  • SEC trading halt of crypto treasury firm QMMM is a TradFi issue

    SEC trading halt of crypto treasury firm QMMM is a TradFi issue 2025-09-30 at 09:14 By Cointelegraph by Jesse Coghlan Shares in QMMM Holdings will be off the market until Oct. 13 after the US securities regulator suspended trading to probe possible stock manipulation. This article is an excerpt from Cointelegraph.com News View Original Source…


  • The hidden risks inside open-source code

    The hidden risks inside open-source code 2025-09-30 at 09:12 By Mirko Zorz Open-source software is everywhere. It runs the browsers we use, the apps we rely on, and the infrastructure that keeps businesses connected. For many security leaders, it is simply part of the environment, not something they think about every day. That is where…


  • CISA Sounds Alarm on Critical Sudo Flaw Actively Exploited in Linux and Unix Systems

    CISA Sounds Alarm on Critical Sudo Flaw Actively Exploited in Linux and Unix Systems 2025-09-30 at 08:48 By The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a critical security flaw impacting the Sudo command-line utility for Linux and Unix-like operating systems to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active…


  • VMware bungles cloud management portal upgrade, twice in two weeks

    VMware bungles cloud management portal upgrade, twice in two weeks 2025-09-30 at 08:44 By Simon Sharwood Promises to get it right this coming weekend VMware has bungled a portal upgrade project that aims to give its customers a superior experience when managing their clouds.… This article is an excerpt from The Register View Original Source…


  • Cyber risk quantification helps CISOs secure executive support

    Cyber risk quantification helps CISOs secure executive support 2025-09-30 at 08:44 By Mirko Zorz In this Help Net Security interview, Vivien Bilquez, Global Head of Cyber Resilience at Zurich Resilience Solutions, discusses how organizations are rethinking cyber resilience. He talks about the priorities CISOs should focus on and the risks that are often overlooked. Bilquez…


  • ‘Government Grift’ ETF tracking Congress trades could launch this week

    ‘Government Grift’ ETF tracking Congress trades could launch this week 2025-09-30 at 08:08 By Cointelegraph by Brayden Lindrea A Bloomberg ETF analyst said the Tuttle Capital Government Grift ETF could launch this week, allowing retail investors to make similar trades to US Congress members. This article is an excerpt from Cointelegraph.com News View Original Source…


  • Psychology is as big a driver of Ethereum as price, study finds

    Psychology is as big a driver of Ethereum as price, study finds 2025-09-30 at 08:08 By Cointelegraph by Martin Young Project Mirror surveyed members of the Ethereum community, finding that Ethereum’s technical strength is invisible without narrative clarity. This article is an excerpt from Cointelegraph.com News View Original Source React to this headline:


  • Your budget Android phone might be spying on you

    Your budget Android phone might be spying on you 2025-09-30 at 08:08 By Sinisa Markovic Researchers have found that many low-cost Android devices come with pre-installed apps that have high-level access to the system. Unlike apps from the Google Play Store, many of these are not subject to thorough checks and can serve as vectors…


  • Keeping the internet afloat: How to protect the global cable network

    Keeping the internet afloat: How to protect the global cable network 2025-09-30 at 08:08 By Mirko Zorz The resilience of the world’s submarine cable network is under new pressure from geopolitical tensions, supply chain risks, and slow repair processes. A new report from the Center for Cybersecurity Policy and Law outlines how governments and industry…


  • Cybersecurity jobs available right now: September 30, 2025

    Cybersecurity jobs available right now: September 30, 2025 2025-09-30 at 08:08 By Anamarija Pogorelec The post Cybersecurity jobs available right now: September 30, 2025 appeared first on Help Net Security. This article is an excerpt from Help Net Security View Original Source React to this headline:


  • Zero Trust at 15: The Strategy That Refused To Become a Product

    Zero Trust at 15: The Strategy That Refused To Become a Product 2025-09-30 at 08:08 By For the 15th anniversary of zero trust, the founder of the zero trust model shares his insights.  This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to this headline:


  • Wisconsin bill to exempt crypto businesses from money licenses

    Wisconsin bill to exempt crypto businesses from money licenses 2025-09-30 at 06:42 By Cointelegraph by Brian Quarmby A new bill in Wisconsin could exempt local crypto users and businesses from money transmitter licenses, boosting mining, staking, and blockchain development. This article is an excerpt from Cointelegraph.com News View Original Source React to this headline:


  • BitMine’s Lee calls ETH a ‘discount to the future,’ Bit Digital eyes $100M

    BitMine’s Lee calls ETH a ‘discount to the future,’ Bit Digital eyes $100M 2025-09-30 at 06:42 By Cointelegraph by Stephen Katte BitMine chairman Tom Lee thinks Ether is trading at a discount because future adoption of the blockchain by Wall Street and AI companies will drive it higher. This article is an excerpt from Cointelegraph.com…


  • YouTube coughs up $24.5 million to make Trump ‘censorship’ case go away

    YouTube coughs up $24.5 million to make Trump ‘censorship’ case go away 2025-09-30 at 06:42 By Simon Sharwood Alphabet’s vid-streamer will fund construction of a ballroom The Donald adores YouTube has agreed to pay $24.5 million to end the case brought by US president Donald Trump, who alleged the vid-streamer had infringed his freedom of…


  • SEC clears DePIN tokens as ‘fundamentally’ outside jurisdiction

    SEC clears DePIN tokens as ‘fundamentally’ outside jurisdiction 2025-09-30 at 04:53 By Cointelegraph by Jesse Coghlan The SEC backed off from DePIN tokens in a rare no-action letter, as the agency’s top brass says it’s not meant to “regulate all economic activity.” This article is an excerpt from Cointelegraph.com News View Original Source React to…


  • SOL price recovers, but new highs depend on multiple factors

    SOL price recovers, but new highs depend on multiple factors 2025-09-30 at 04:53 By Cointelegraph by Marcel Pechman SOL’s faces a fresh wave of challenges from competing blockchains, and the path to $250 depends on a potential spot ETF approval and institutional inflows. This article is an excerpt from Cointelegraph.com News View Original Source React…


Browse older archives

Scroll to Top