https://cloud.google.com/blog/products/identity-security/too-many-threats-too-much-data-new-survey-heres-how-to-fix-that A new study commissioned by Google Cloud has revealed that security professionals are drowning in threat intelligence data, with 61 percent of...
https://security.googleblog.com/2025/07/introducing-oss-rebuild-open-source.html Google has unveiled OSS Rebuild, a comprehensive security initiative designed to strengthen trust in open source package ecosystems by automatically reproducing and verifying the...
https://socket.dev/blog/toptal-s-github-organization-hijacked-10-malicious-packages-published Unknown threat actors successfully breached Toptal’s GitHub organisation account in a sophisticated supply chain attack, using the compromised access to publish 10...
https://tracebit.com/blog/code-exec-deception-gemini-ai-cli-hijack Security researchers at Tracebit have discovered a significant vulnerability in Google’s newly released Gemini CLI AI coding assistant that allowed attackers to execute malicious commands and...
https://www.abc.net.au/news/2025-07-24/mercer-super-security-breach-theft-australia-post/105565592 Mercer Super and Virgin Money Super members have become victims of an unusual security breach after thieves targeted Australia Post’s Melbourne General Post Office...
https://www.nytimes.com/2025/07/21/briefing/ai-vs-ai.html Artificial intelligence has fundamentally transformed the cybersecurity landscape, with cybercriminals leveraging AI to dramatically scale their operations while security companies deploy competing AI systems...