Sep 12, 2025 | Podcast
https://arstechnica.com/information-technology/2025/09/the-number-of-mis-issued-1-1-1-1-certificates-grows-heres-the-latest In a troubling development, security researchers have uncovered that a Microsoft-trusted certificate authority, Fina CA, has mis-issued a total...
Sep 11, 2025 | Podcast
https://www.bleepingcomputer.com/news/security/icloud-calendar-abused-to-send-phishing-emails-from-apples-servers In a concerning development, cybercriminals have been exploiting the legitimate iCloud Calendar feature to distribute phishing emails that appear to...
Sep 10, 2025 | Podcast
https://blog.gitguardian.com/ghostaction-campaign-3-325-secrets-stolen Security researchers at GitGuardian have uncovered a massive supply chain attack dubbed “GhostAction” that compromised 327 GitHub users across 817 repositories, resulting in the theft...
Sep 9, 2025 | Podcast
https://www.nytimes.com/2025/09/04/world/asia/china-hack-salt-typhoon.html Security officials and cybersecurity experts are warning that a sophisticated Chinese cyber espionage campaign known as Salt Typhoon represents China’s most ambitious hacking operation to...
Sep 8, 2025 | Podcast
https://www.sonatype.com/blog/npm-chalk-and-debug-packages-hit-in-software-supply-chain-attack Cybercriminals have executed what security researchers are calling the largest npm supply chain attack in history, compromising 18 highly popular JavaScript packages that...
Sep 5, 2025 | Podcast
https://source.android.com/docs/security/bulletin/2025-09-01 Google has released its September 2025 Android security update, the largest patch bundle of the year containing fixes for 84 vulnerabilities, including two high-severity flaws that are being actively...
Sep 4, 2025 | Podcast
https://www.itnews.com.au/news/melbourne-dev-finds-gift-card-pins-can-be-brute-forced-620022 A Melbourne software developer has discovered a serious vulnerability in gift cards sold at Australian supermarkets that allows attackers to easily guess PINs and steal stored...
Sep 3, 2025 | Podcast
https://www.bleepingcomputer.com/news/security/hackers-use-new-hexstrike-ai-tool-to-rapidly-exploit-n-day-flaws Cybercriminals are increasingly leveraging HexStrike-AI, a legitimate open-source penetration testing framework, to rapidly exploit newly disclosed n-day...
Sep 2, 2025 | Podcast
https://www.zscaler.com/blogs/company-news/salesloft-drift-supply-chain-incident-key-details-and-zscaler-s-response Cybersecurity company Zscaler has confirmed it suffered a data breach after threat actors compromised its Salesforce instance through the Salesloft...
Sep 1, 2025 | Podcast
https://www.cyber.gov.au/resources-business-and-government/maintaining-devices-and-systems/outsourcing-and-procurement/cyber-supply-chains/a-shared-vision-of-software-bill-of-materials-for-cybersecurity Australia’s Cyber Security Centre has joined 16...