May 15, 2025 | Podcast
https://www.morphisec.com/blog/new-noodlophile-stealer-fake-ai-video-generation-platforms Cybersecurity researchers have discovered a sophisticated malware campaign using fake artificial intelligence tools to distribute an information-stealing malware called...
May 14, 2025 | Podcast
https://socket.dev/blog/malicious-npm-packages-hijack-cursor-editor-on-macos Security researchers have uncovered a sophisticated attack targeting users of Cursor, a popular AI-powered code editor for macOS. Three malicious npm packages, which remain available for...
May 13, 2025 | Podcast
Welcome to AppSec Unlocked. In this article, we’re diving deep into Secure Development Lifecycle training. We’re going to explore how to build security into every phase of your development process—from initial planning through deployment and beyond. Let me...
May 12, 2025 | Podcast
https://plc.pearson.com/en-GB/news-and-insights/news/cyber-security-incidenthttps://www.bleepingcomputer.com/news/security/education-giant-pearson-hit-by-cyberattack-exposing-customer-data/ Education publishing powerhouse Pearson has confirmed a significant...
May 9, 2025 | Podcast
https://www.theguardian.com/environment/2025/apr/29/source-of-data-are-electric-cars-vulnerable-to-cyber-spies-and-hackers Cybersecurity experts are raising alarms about the potential for electric vehicles to be exploited as surveillance tools, particularly those...
May 8, 2025 | Podcast
https://techcommunity.microsoft.com/blog/microsoftdefendercloudblog/the-risk-of-default-configuration-how-out-of-the-box-helm-charts-can-breach-your/4409560 Microsoft security researchers have issued an urgent warning about significant security risks posed by default...