Wednesday, October 1, 2025
Follow on LinkedIn
Google Drive Ransomware Detection

New Google Drive Desktop Feature adds AI-powered Ransomware Detection to Prevent Cyberattacks

Google has introduced a new AI-powered ransomware detection feature for Google Drive for desktop, designed to block cyberattacks and protect user files automatically. This enhancement...
Allianz Life Data Breach

Allianz Life Data Breach Exposes Personal Records of 1.5 Million Users

Allianz Life Insurance Company of North America has reported a significant data security incident that has exposed the sensitive personal information of an estimated...
AI-Powered FunkLocker Ransomware

AI-Powered FunkLocker Ransomware Leverages Windows utilities to Disable Defenses

A new ransomware strain, dubbed FunkLocker, is leveraging artificial intelligence to expedite its development, while relying on the abuse of legitimate Windows utilities to...
Google Gemini Vulnerabilities

Google Gemini Vulnerabilities Let Attackers Exfiltrate Users’ Saved Data and Location

Three new vulnerabilities in Google's Gemini AI assistant suite could have allowed attackers to exfiltrate users' saved information and location data. The vulnerabilities uncovered by...
Tesla's Telematics Control Unit Vulnerability

Tesla’s Telematics Control Unit Vulnerability Let Attackers Gain Code Execution as Root

A security vulnerability in Tesla's Telematics Control Unit (TCU) allowed attackers with physical access to bypass security measures and gain full root-level code execution. The...
VMware Tools 0-Day Vulnerability

VMware Tools and Aria 0-Day Vulnerability Exploited to Escalate Privileges and Execute Code as...

A zero-day local privilege escalation vulnerability in VMware Tools and VMware Aria Operations is being actively exploited in the wild. The flaw, tracked as...
Western Digital My Cloud Devices Vulnerability

Critical Western Digital My Cloud NAS Vulnerability Allows Remote Code Execution

Western Digital has released security updates for a critical vulnerability affecting multiple My Cloud network-attached storage (NAS) devices. The flaw, tracked as CVE-2025-30247, could allow...
Apple Font Parser Vulnerability

Apple Font Parser Vulnerability Enables Malicious Fonts to Corrupt Process Memory

Apple has rolled out security updates across its operating systems to address a vulnerability in the Font Parser component that could allow malicious fonts...
Weaponized Microsoft Teams

Hackers Trick Users into Download Weaponized Microsoft Teams to Gain Remote Access

A sophisticated cyber campaign is exploiting the trust users place in popular collaboration software, tricking them into downloading a weaponized version of Microsoft Teams...
Harrods Data Breach

New Harrods Data Breach Exposes 430,000 Customer Personal Records

Luxury department store Harrods has disclosed a significant data breach affecting approximately 430,000 customer records after a third-party provider was compromised. The hackers behind the...

Top 10