by Syndicated News Feed | Oct 2, 2025 | IT Security
Criminals with potential links to the notorious Clop ransomware mob are bombarding Oracle execs with extortion emails, claiming to have stolen sensitive data from Big Red’s E-Business Suite, according to researchers. Google’s Threat Intelligence Group...
by Syndicated News Feed | Oct 2, 2025 | IT Security
An arsenal of angry European Parliament members (MEPs) is demanding answers from senior commissioners about why EU subsidies are ending up in the pockets of spyware companies. The group of 39 politicians referred to recent investigations that revealed countries such...
by Syndicated News Feed | Oct 2, 2025 | IT Security
Two new spyware campaigns that researchers call ProSpy and ToSpy lured Android users with fake upgrades or plugins for the Signal and ToTok messaging apps to steal sensitive data. To give the malicious files a sense of legitimacy, the threat actor distributed them...
by Syndicated News Feed | Oct 2, 2025 | IT Security
A hacking crew claims to have broken into Red Hat’s private GitLab repositories, exfiltrating some 570GB of compressed data, including sensitive documents belonging to customers. An extortion group calling itself “the Crimson Collective” posted on...
by Syndicated News Feed | Oct 2, 2025 | IT Security
ESET researchers have uncovered two Android spyware campaigns targeting individuals interested in secure communication apps, namely Signal and ToTok. These campaigns distribute malware through deceptive websites and social engineering and appear to target residents of...
by Syndicated News Feed | Oct 1, 2025 | IT Security
A ransomware attack at Motility Software Solutions, a provider of dealer management software (DMS), has exposed the sensitive data of 766,000 customers. Motility (formerly known as Systems 2000/Sys2K) is a provider of DMS software used by 7,000...
by Syndicated News Feed | Oct 1, 2025 | IT Security
A 9.9 out of 10 severity bug in Red Hat’s OpenShift AI service could allow a remote attacker with minimal authentication to steal data, disrupt services, and fully hijack the platform. “A low-privileged attacker with access to an authenticated account, for...
by Syndicated News Feed | Oct 1, 2025 | IT Security
Google has begun rolling out a new AI-powered security feature for Google Drive desktop, which will automatically pause file syncing when it detects a ransomware attack to minimize impact. While this will not block ransomware from encrypting files on the infected...
by Syndicated News Feed | Oct 1, 2025 | IT Security
We’re kicking off the month with a focus on the human element: the first line of defense, but also the path of least resistance for many cybercriminals 01 Oct 2025 October is Cybersecurity Awareness Month and what better way to open it than with a reminder that...
by Syndicated News Feed | Oct 1, 2025 | IT Security
Enterprises aren’t keen on letting autonomous agents take the wheel amid fears over trust and security as research once again shows that AI hype is crashing against the rocks of reality. Tech analyst Gartner looked at the next big thing in AI evolution – fully...