China-Linked Tick Group Exploits Lanscope Zero-Day to Hijack Corporate Systems

Oct 31, 2025Ravie LakshmananEndpoint Security / Cyber Espionage The exploitation of a recently disclosed critical security…

GPT-5 Agent That Finds and Fixes Code Flaws Automatically

Oct 31, 2025Ravie LakshmananArtificial Intelligence / Code Security OpenAI has announced the launch of an “agentic…

Nation-State Hackers Deploy New Airstalk Malware in Suspected Supply Chain Attack

Oct 31, 2025Ravie LakshmananMalware / Browser Security A suspected nation-state threat actor has been linked to…

China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats

Oct 31, 2025Ravie LakshmananMalware / Threat Intelligence A China-affiliated threat actor known as UNC6384 has been…

Google Gemini Adds Presentation Generation in Canvas

Image: Google Google is giving its Gemini AI a new stage: the slideshow. A fresh update…

CISA and NSA Issue Urgent Guidance to Secure WSUS and Microsoft Exchange Servers

Oct 31, 2025Ravie LakshmananVulnerability / Threat Intelligence The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and…

Windows 11 Update Brings Customizable Start Menu and Streamlined App Discovery

Image: Envato Microsoft has finally begun rolling out a redesigned Start menu for Windows 11, to…

CISA Flags VMware Zero-Day Exploited by China-Linked Hackers in Active Attacks

Oct 31, 2025Ravie LakshmananVulnerability / Cyber Attack The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on…

A New Security Layer for macOS Takes Aim at Admin Errors Before Hackers Do

Oct 31, 2025The Hacker NewsEndpoint Security / Network Security A design firm is editing a new…

PhantomRaven Malware Found in 126 npm Packages Stealing GitHub Tokens From Devs

Oct 30, 2025Ravie LakshmananDevSecOps / Software Security Cybersecurity researchers have uncovered yet another active software supply…