Latest Cybersecurity News and Articles


In Other News: $900k for XSS Bugs, HybridPetya Malware, Burger King Censors Research

12 September 2025
Noteworthy stories that might have slipped under the radar: Huntress research raises concerns, Google paid out $1.6 million for cloud vulnerabilities, California web browser bill. The post In Other News: $900k for XSS Bugs, HybridPetya Malware, Burger King Censors Research appeared first on SecurityWeek.

DELMIA Factory Software Vulnerability Exploited in Attacks

12 September 2025
A deserialization of untrusted data in the MOM software allows attackers to achieve remote code execution. The post DELMIA Factory Software Vulnerability Exploited in Attacks appeared first on SecurityWeek.

Apple Sends Fresh Wave of Spyware Notifications to French Users

12 September 2025
Apple this year sent at least four rounds of notifications to French users potentially targeted by commercial spyware. The post Apple Sends Fresh Wave of Spyware Notifications to French Users appeared first on SecurityWeek.

New HybridPetya Ransomware Bypasses UEFI Secure Boot With CVE-2024-7344 Exploit

12 September 2025
Cybersecurity researchers have discovered a new ransomware strain dubbed HybridPetya that resembles the notorious Petya/NotPetya malware, while also incorporating the ability to bypass the Secure Boot mechanism in Unified Extensible Firmware Interface (UEFI) systems using a now-patched vulnerability disclosed earlier this year. Slovakian cybersecurity company ESET said the samples were uploaded

F5 to Acquire CalypsoAI for $180 Million

12 September 2025
F5 is buying CalypsoAI for its adaptive AI inference security solutions, which will be integrated into its Application Delivery and Security Platform. The post F5 to Acquire CalypsoAI for $180 Million appeared first on SecurityWeek.

Critical CVE-2025-5086 in DELMIA Apriso Actively Exploited, CISA Issues Warning

12 September 2025
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a critical security flaw impacting Dassault Systèmes DELMIA Apriso Manufacturing Operations Management (MOM) software to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The vulnerability, tracked as CVE-2025-5086, carries a CVSS score of 9.0 out of 10.0. According to

CISA: CVE Program to Focus on Vulnerability Data Quality

12 September 2025
CISA says it is time for the CVE Program to focus on improving trust, responsiveness, and the caliber of vulnerability data. The post CISA: CVE Program to Focus on Vulnerability Data Quality appeared first on SecurityWeek.

VMScape: Academics Break Cloud Isolation With New Spectre Attack

12 September 2025
Exploiting incomplete speculative execution attack mitigations extended to the branch predictor state, VMScape leaks arbitrary memory. The post VMScape: Academics Break Cloud Isolation With New Spectre Attack appeared first on SecurityWeek.

Payment System Vendor Took Year+ to Patch Infinite Card Top-Up Hack: Security Firm

12 September 2025
KioSoft was notified about a serious NFC card vulnerability in 2023 and only recently claimed to have released a patch. The post Payment System Vendor Took Year+ to Patch Infinite Card Top-Up Hack: Security Firm appeared first on SecurityWeek.

Cloud-Native Security in 2025: Why Runtime Visibility Must Take Center Stage

12 September 2025
The security landscape for cloud-native applications is undergoing a profound transformation. Containers, Kubernetes, and serverless technologies are now the default for modern enterprises, accelerating delivery but also expanding the attack surface in ways traditional security models can’t keep up with. As adoption grows, so does complexity. Security teams are asked to monitor sprawling hybrid

Russian Offensive Cyber Operations: Analyzing Putin’s Foreign Policy Actions

12 September 2025
The broad strokes of what cybersecurity leaders need to know about Putin’s foreign policy actions. 

Cursor AI Code Editor Flaw Enables Silent Code Execution via Malicious Repositories

12 September 2025
A security weakness has been disclosed in the artificial intelligence (AI)-powered code editor Cursor that could trigger code execution when a maliciously crafted repository is opened using the program. The issue stems from the fact that an out-of-the-box security setting is disabled by default, opening the door for attackers to run arbitrary code on users' computers with their privileges. "

Bulletproof Host Stark Industries Evades EU Sanctions

11 September 2025
In May 2025, the European Union levied financial sanctions on the owners of Stark Industries Solutions Ltd., a bulletproof hosting provider that materialized two weeks before Russia invaded Ukraine and quickly became a top source of Kremlin-linked cyberattacks and disinformation campaigns. But new data shows those sanctions have done little to stop Stark from simply rebranding and transferring their assets to other corporate entities controlled by its original hosting providers.

1.6M Calls and Voicemails Exposed Online

11 September 2025
1.6 million audio files were exposed. 

Google Pixel 10 Adds C2PA Support to Verify AI-Generated Media Authenticity

11 September 2025
Google on Tuesday announced that its new Google Pixel 10 phones support the Coalition for Content Provenance and Authenticity (C2PA) standard out of the box to verify the origin and history of digital content. To that end, support for C2PA's Content Credentials has been added to Pixel Camera and Google Photos apps for Android. The move, Google said, is designed to further digital media

Webinar Today: Breaking AI – Inside the Art of LLM Pen Testing

11 September 2025
Join the webinar as we reveal a new model for AI pen testing – one grounded in social engineering, behavioral manipulation, and even therapeutic dialogue. The post Webinar Today: Breaking AI – Inside the Art of LLM Pen Testing appeared first on SecurityWeek.

Senator Wyden Urges FTC to Probe Microsoft for Ransomware-Linked Cybersecurity Negligence

11 September 2025
U.S. Senator Ron Wyden has called on the Federal Trade Commission (FTC) to probe Microsoft and hold it responsible for what he called "gross cybersecurity negligence" that enabled ransomware attacks on U.S. critical infrastructure, including against healthcare networks. "Without timely action, Microsoft's culture of negligent cybersecurity, combined with its de facto monopolization of the

Cisco Patches High-Severity IOS XR Vulnerabilities

11 September 2025
High-severity flaws in IOS XR could lead to ISO image verification bypass and denial-of-service conditions. The post Cisco Patches High-Severity IOS XR Vulnerabilities appeared first on SecurityWeek.

UK Train Operator LNER Warns Customers of Data Breach

11 September 2025
LNER said the security incident involved a third-party supplier and resulted in contact information and other data being compromised. The post UK Train Operator LNER Warns Customers of Data Breach appeared first on SecurityWeek.

Critical Chrome Vulnerability Earns Researcher $43,000

11 September 2025
Google patched a critical use-after-free vulnerability in Chrome that could potentially lead to code execution. The post Critical Chrome Vulnerability Earns Researcher $43,000 appeared first on SecurityWeek.