What we are reading

We are always asked what we are reading and paying attention to, whilst we want to keep you updated with this there is just too much stuff. Here is a sample of the daily reading lists.

Google warns Salesloft breach impacted some Workspace accounts | The Cyber Security Hub™
2025-08-29 10:30:11

Network Security Specialist | CCIE | Penetration Testing | Vulnerability Management | Cloud & Network Security Expert | CESG CHECK Team Leader ( ...

Go to External Site

 

NPM packages from Nx targeted in latest worrying software supply chain attack
2025-08-29 09:30:04

An abstract image of a lock against a digital background, denoting cybersecurity. (Image Credit: TheDigitalArtist / Pixabay). | Credit: Pixabay.

Go to External Site

 

Nx Packages With Millions of Weekly Downloads Hacked With Credential Stealer Malware
2025-08-29 09:30:04

A sophisticated supply chain attack has compromised the popular Nx build platform, affecting millions of weekly downloads and resulting in ...

Go to External Site

 

Google to block unverified Android app developers to boost security - Silicon Republic
2025-08-29 09:30:04

The new requirement is necessary for all Android app developers and not just those publishing apps on the Play Store.

Go to External Site

 

Malware attack and defense game in fractional-order Internet of Underwater Things
2025-08-29 08:30:04

Differential game model of malware and system in IoUT. •. Derivation of fractional-order Nash equilibrium solutions. •. AI algorithms optimize defense ...

Go to External Site

 

Mac Malware 'JSCoreRunner' Abuses Online PDF Tool to Spread - GBHackers
2025-08-29 08:30:03

A sophisticated new Mac malware campaign has emerged that exploits users' trust in free online PDF conversion tools.

Go to External Site

 

Threat Actors Use Facebook Ads to Deliver Android Malware - GBHackers
2025-08-29 08:30:03

Cybercriminals are increasingly turning their sights from desktop to mobile, exploiting Meta's advertising platform to distribute a sophisticated ...

Go to External Site

 

Hackers Exploit Microsoft Teams to Deliver PowerShell Malware on Windows - Cyber Press
2025-08-29 08:30:03

Organizations can now gain full clarity into every identity—whether cloud users, service accounts, or automated bots—without cost or commitment.

Go to External Site

 

AI isn't taking over the world, but here's what you should worry about - Help Net Security
2025-08-29 08:30:03

In this Help Net Security video, Josh Meier, Senior Generative AI Author at Pluralsight, debunks the myth that AI could “escape” servers or act on ...

Go to External Site

 

SikkahBot Malware Campaign Targets Students in Bangladesh - The Cyber Express
2025-08-29 08:30:03

CRIL uncovers SikkahBot malware campaign using fake apps to steal student data and execute banking fraud in Bangladesh through smishing and USSD ...

Go to External Site

 

Mac Users at Risk - PDF Conversion Tool Exploited by Stealthy 'JSCoreRunner' Malware
2025-08-29 08:30:03

JSCoreRunner malware - A sophisticated new Mac malware campaign has been uncovered by Mosyle, a leading Apple security provider.

Go to External Site

 

Energy Storage Delays in California: A Wake-Up Call for Resilience in the Decarbonization Era
2025-08-29 06:30:08

... critical vulnerability in California's energy infrastructure. Originally slated to restart in June 2025, the project was indefinitely postponed ...

Go to External Site

 

New framework aims to outsmart malware evasion tricks - Help Net Security
2025-08-29 06:30:03

Researchers introduce the ERDALT malware detection framework, an approach designed to resist adversarial attacks and improve resilience.

Go to External Site

 

AI ransomware discovery not a cause for concern, yet… - The Stack
2025-08-29 06:30:03

It uses an OpenAI model on the Ollama API to automate malicious scripts. However, Senior Malware Researcher Anton Cherepanov told The Stack: “Although ...

Go to External Site

 

MATLAB dev says ransomware gang stole data of 10,000 people - Bleeping Computer
2025-08-29 06:30:03

MathWorks, a leading developer of mathematical simulation and computing software, revealed that a ransomware gang stole the data of over 10000 ...

Go to External Site

 

NX build compromise detection and response | Kaspersky official blog
2025-08-29 05:30:04

The attackers used a compromised token issued for one of the Nx package maintainers to publish multiple malicious versions of the Nx package and ...

Go to External Site

 

Link up, lift up, level up - Cisco Talos Blog
2025-08-29 05:30:03

This week, Joe encourages you to find your community in cybersecurity and make the effort to grow, network and hack stuff together.

Go to External Site

 

TamperedChef Malware Disguised as Fake PDF Editors Steals Credentials and Cookies
2025-08-29 05:30:03

Cybersecurity researchers have discovered a cybercrime campaign that's using malvertising tricks to direct victims to fraudulent sites to deliver ...

Go to External Site

 

NPM packages from Nx targeted in latest worrying software supply chain attack - TechRadar
2025-08-29 05:30:03

Hackers are targeting the popular open source build system and development toolkit.

Go to External Site

 

These dangerous Android malware apps have been installed millions of times - MSN
2025-08-29 05:30:03

Researchers found 15 predatory loan apps on the Play Store · These apps promise cheap and quick loans, and then extort money and harass their victims ...

Go to External Site

 

The Centralization Risks of Layer 2s and Their Impact on Ethereum's Future - AInvest
2025-08-29 03:30:09

... critical vulnerability, threatening both the technical integrity of the network and the long-term value proposition for investors. Sequencers ...

Go to External Site

 

OpenAI Adds Parental Controls to ChatGPT After Teen Suicide Lawsuit - WebProNews
2025-08-29 03:30:09

The lawsuit highlights a critical vulnerability in generative AI: its capacity to mimic empathetic conversation without true understanding or ethical ...

Go to External Site

 

Perplexity's AI Browser Comet Put Users At Serious Data Risks: Rival Firm Brave
2025-08-29 03:30:08

Perplexity's new AI-powered browser, Comet, was found to have a critical vulnerability that would have compromised users' most sensitive data ...

Go to External Site

 

Police smash NIN fraud syndicate, 8 arrested, 14 fake domains shut - Vanguard News
2025-08-29 02:30:12

We conducted durability assessment and penetration testing and discovered there was no breach. What we found were third parties creating ...

Go to External Site

 

Turla targets Starlink-connected devices through other hackers - SecNews
2025-08-29 02:30:11

Hunk Companion: Critical vulnerability in WordPress plugin. Δεν ήταν δυνατόν να φορτωθεί το Disqus. Εάν είστε συντονιστής παρακαλούμε να δείτε τον ...

Go to External Site

 

Firefly: The High-Conviction Play in Cloud Resilience's Next Frontier - AInvest
2025-08-29 02:30:09

... critical vulnerability: the fragility of legacy disaster recovery (DR) systems. As cyberattacks surge, cloud complexity escalates, and regulatory ...

Go to External Site

 

Using Enterprise Security to Protect the Digital Frontier
2025-08-29 01:00:08

Human factors remain a critical vulnerability and a focal point for improvement. As social engineering attacks like phishing continue to exploit ...

Go to External Site

 

ShadowSilk Targets Penetration-Testing Tools and Public Exploits to Breach Organizations
2025-08-29 00:50:03

Cybersecurity experts discovered an advanced persistent threat (APT) cluster called ShadowSilk in a thorough research published by Group-IB.

Go to External Site

 

Anchorage man, Indian national charged in nine-year fraud, money laundering scheme
2025-08-29 00:20:02

... computer's virus protection. Co-conspirators then offered refunds to the customers for disputed charges, typically totaling $400-$500. Then, they ...

Go to External Site