Aug 6, 2025 | Podcast
https://www.cloudflare.com/threat-intelligence/research/report/attackers-abusing-proofpoint-intermedia-link-wrapping-to-deliver-phishing-payloads Threat actors have discovered a new method to legitimise phishing attacks by exploiting link-wrapping security features...
Aug 5, 2025 | Podcast
https://cypressdefense.com/resources/state-of-application-security-report A new report from Cypress Data Defense has revealed a troubling state of application security, with 62% of organisations knowingly deploying vulnerable code to production environments to meet...
Aug 4, 2025 | Podcast
https://www.aim.security/lp/aim-labs-curxecute-blogpost Security researchers at Aim Security have discovered a critical vulnerability dubbed CurXecute in the popular AI-powered code editor Cursor, which affects nearly all versions of the IDE and can be exploited to...
Aug 1, 2025 | Podcast
https://cloud.google.com/blog/products/identity-security/too-many-threats-too-much-data-new-survey-heres-how-to-fix-that A new study commissioned by Google Cloud has revealed that security professionals are drowning in threat intelligence data, with 61 percent of...
Jul 31, 2025 | Podcast
https://security.googleblog.com/2025/07/introducing-oss-rebuild-open-source.html Google has unveiled OSS Rebuild, a comprehensive security initiative designed to strengthen trust in open source package ecosystems by automatically reproducing and verifying the...
Jul 30, 2025 | Podcast
https://socket.dev/blog/toptal-s-github-organization-hijacked-10-malicious-packages-published Unknown threat actors successfully breached Toptal’s GitHub organisation account in a sophisticated supply chain attack, using the compromised access to publish 10...