""Don't leave them to their own devices."
Views expressed in this cybersecurity, cyber crime update are those of the reporters and correspondents. Accessed on 30 October 2025, 1448 UTC.
Content and Source via email subscription from https://feedly.com.
https://feedly.com/i/subscription/feed%2Fhttps%3A%2F%2Fthecyberwire.com%2Ffeeds%2Frss.xml
Please check subscription link or scroll down to read your selections. Thanks for joining us today.
Russ Roberts (https://www.hawaiicybersecurityjournal.net).
65
Yesterday
8h
In this episode of Threat Vector, host David Moulton speaks with Asher Davila, Principal Security Researcher at Palo Alto Networks, about the newly released 2025 Device Security Enterprise Threat Report. This data-rich report reveals that over 21% of connected enterprise devices have known vulnerabilities, and nearly 40% of devices registered in Active Directory lack proper EDR/XDR coverage. E
9h
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making head
9h
Next week, California will hold a major election on Tuesday, November 4, amid heightened cyber risk and increased exposure to potential attacks. With the ongoing government shutdown and reduced grant funding for local counties overseeing the elections, vulnerabilities are growing. Sanny Liao, Co-Founder and CTO of Fable Security, joins to discuss the biggest cyber threats to this election, how
18h
Explosions rock a shuttered Myanmar cybercrime hub. The Aisuru botnet shifts from DDoS to residential proxies. Dentsu confirms data theft at Merkle. Boston bans biometrics. Proton restores journalists’ email accounts after backlash. Memento labs admits Dante spyware is theirs. Australia accuses Microsoft of improperly forcing users into AI upgrades. CISA warns of active exploitation targeting manu
18h
ConductorOne raises $79 million in Series B round.
22h
Aisuru botnet shifts its business model to offer residential proxies. Ad agency Dentsu confirms data theft at US subsidiary Merkle.
Oct 28, 2025
1d
Most marketers learn executive communication the hard way. Rob Sobers, CMO at Varonis, joins Gianna and Charles to share what he’s figured out along the way, how to lead with the answer, give data real context, and know when to stop talking. He explains how to tailor communication for CEOs, boards, and peers, and why too much detail can make you sound less senior, not more informed. The conversati
1d
WSUS attacks escalate as emergency patch fails to fully contain exploited flaw. Schneider Electric and Emerson are listed among victims in the Oracle EBS cyberattack. Google debunks reports of a massive GMail breach. A new banking trojan mimics human behavior for stealth. Sweden’s power grid operator confirms a cyberattack. Italian spyware targets Russian and Belarusian organizations. The U.S. dec
1d
Schneider Electric and Emerson were allegedly breached via Oracle EBS flaw. Swedish power grid operator discloses breach.
Oct 27, 2025
2d
Darren Kane, Chief Security Officer at NBN, Australia’s national broadband network joins Ann on this week's episode of Afternoon Cyber Tea to shares insights from his unique journey through law enforcement, financial enforcement, and corporate security, and how those experiences shaped his leadership of a converged security organization that unites physical and cyber defense. He discusses the cha
2d
Privacy is one of the most universally valued rights. Yet, despite its importance, data breaches exposing millions of people's sensitive information have become routine. Many have come to assume that their personal data has already been, or inevitably will be, compromised. Despite this reality, prioritizing privacy is more important than ever. In this episode of CISO Perspectives, host Kim Jones
2d
Managing identity has been something that organizations and security leaders have been grappling with for years. Traditionally, managing identity has been used as one of the primary ways to enforce access control across an organization and prevent unauthorized parties from accessing sensitive systems.
2d
Managing identity has been an evolving challenge as networks have only continued to grow and become more sophisticated. In this current landscape, these challenges have only become further exacerbated with new emerging technologies. In this episode of CISO Perspectives, host Kim Jones sits down with Richard Bird from Singular AI to discuss this evolving paradigm. Throughout this conversation, Ki
2d
The UN launches the world’s first global treaty to combat cybercrime. A House Democrats’ job portal left security clearance data exposed online. A new data leak exposes 183 million email addresses and passwords. Threat actors target Discord users with an open-source red-team toolkit. A new campaign targets unpatched WordPress plugins. The City of Gloversville, New York, suffers a ransomware attack
2d
Democrats' job portal left security clearance data exposed. Data Leak exposes over 180 million email addresses and passwords.
Oct 24, 2025
5d
Noam Moshe, Claroty’s Vulnerability Research Team Lead, joins Dave to discuss Team 82's work on "Turning Camera Surveillance on its Axis." Team82 disclosed four vulnerabilities in Axis.Remoting—deserialization, a MiTM “pass-the-challenge” NTLMSSP flaw, and an unauthenticated fallback HTTP endpoint—that enable pre-auth remote code execution against Axis Device Manager and Axis Camera Station. Th
5d
Foreign hackers breached a US nuclear weapons manufacturing site. China accuses the US of hacking its national time center.
5d
A former defense contractor is charged with attempting to sell trade secrets to Russia. Researchers uncover critical vulnerabilities in TP-Link routers. Microsoft patches a critical Windows Server Update Service flaw. CISA issues eight new ICS advisories. “Shadow Escape” targets LLMs database connections. Halloween-themed scams spike. Our guest is Chris Inglis, first National Cyber Director, speak
New TP-Link flaws can grant root access. DDoS attack disrupts food deliveries across Russia.
Oct 23, 2025
6d
On this week's episode of The FAIK Files: Google begins rolling out Gemini 3.0 and other AI updates; We look at new studies showing where AI gets it wrong, from misrepresenting news to writing vulnerable code; The latest on AI-driven job loss, including leaked documents from Amazon; and, a roundup of recent deepfake stories, including a Tory MP and the Irish election.
6d
CISA Layoffs threaten U.S. cyber coordination with states, businesses, and foreign partners. Google issues its second emergency Chrome update in a week, and puts Privacy Sandbox out of its misery. OpenAI’s new browser proves vulnerable to indirect prompt injection. SpaceX disables Starlink devices used by scam compounds. Reddit sues alleged data scrapers. Blue Cross Blue Shield of Montana suffers
6d
Google issues an emergency Chrome update for the second time in a week. OpenAI's new browser is vulnerable to injection.
Oct 22, 2025
7d
In this episode of Threat Vector, David Moulton speaks with two cybersecurity leaders from Palo Alto Networks: Sarit Tager, Vice President of Product Management, and Krithivasan Mecheri (Krithi), Senior Director of Product Security. Together, they dive into the urgent challenges of securing modern development in the age of AI. The discussion explores the rise of Application Security Posture M
7d
In this special policy series, the Caveat team is taking a deep dive into key topic areas that are likely to generate notable conversations and political actions throughout the current administration.
7d
This week, while Dave Bittner is on vacation, hosts Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are ma
7d
In this Caveat Policy Deep Dive, our conversation and analysis revolve around North Korean hacking. Throughout this conversation, we break down how North Korea has transformed itself into one of the largest nation-state hackers today. We dive into what types of attacks they perform, how they have evolved these attacks over time, and how they use their ill-gotten gains to support their economy and
7d
A foreign threat actor breached a key U.S. nuclear weapons manufacturing site. The cyberattack on Jaguar Land Rover is the most financially damaging cyber incident in UK history. A new report from Microsoft’ warns that AI is reshaping cybersecurity at an unprecedented pace. The ToolShell vulnerability fuels Chinese cyber operations across four continents. Fake browser updates are spreading RansomH
7d
Dataminr will acquire ThreatConnect for $290 million.
Jaguar Land Rover ransomware attack is the costliest cyberattack in UK history. Russian threat actor deploys new malware.
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
Comments
Post a Comment
Please leave a comment about our recent post.