Newark, United States, October 9th, 2025, CyberNewsWire Lightship Security, an Applus+ Laboratories company and accredited cryptographic security test laboratory, and the OpenSSL Corporation, the co-maintainer […]
Hackers Access SonicWall Cloud Firewall Backups, Spark Urgent Security Checks
SonicWall on Wednesday disclosed that an unauthorized party accessed firewall configuration backup files for all customers who have used the cloud backup service. “The files […]
SquareX Shows AI Browsers Fall Prey to OAuth Attacks, Malware Downloads and Malicious Link Distribution
Palo Alto, California, October 9th, 2025, CyberNewsWire As AI Browsers rapidly gain adoption across enterprises, SquareX has released critical security research exposing major vulnerabilities that […]
Take Note: Cyber-Risks With AI Notetakers
Transcription applications are joining your online meetings. Here’s how to create policies for ensuring compliance and security of your information. The original article found on […]
SaaS Breaches Start with Tokens – What Security Teams Must Watch
Token theft is a leading cause of SaaS breaches. Discover why OAuth and API tokens are often overlooked and how security teams can strengthen token […]
Homeland Security’s reassignment of CISA staff leaves US networks exposed
The US Department of Homeland Security has started reassigning cybersecurity personnel to non-cyber duties tied to deportation and border enforcement priorities. Hundreds of workers within […]
New QR Code-Based Quishing Attack Targets Microsoft Users
A sophisticated quishing campaign leveraging weaponized QR codes has been uncovered, specifically targeting Microsoft users with seemingly innocuous document review requests. By exploiting advanced evasion […]
Your cyber risk problem isn’t tech — it’s architecture
The creation of an ongoing cyber risk management process, aligned with the governance of the information security management process, is a premise that ensures the […]
Cybercriminals Impersonate HR Departments to Harvest Your Gmail Login Details
A seemingly legitimate Zoom document share from “HR” redirected victims through a fake bot-protection gate into a Gmail login phish. User credentials are exfiltrated live […]
PoC Released for Nothing Phone Code-Execution Vulnerability
A proof-of-concept exploit has been published for a critical flaw in the secure boot process of the Nothing Phone (2a) and CMF Phone 1. This […]