PurpleBravo’s Targeting of the IT Software Supply Chain
Executive Summary PurpleBravo is a North Korean state-sponsored threat group that overlaps with the “Contagious Interview” campaign first documented in November 2023. It...
Distributed and AI-powered search for OODA loop
Move from manual search to real-time answers through secure distributed search and AI for defence. - Read more
Blind SSRF/DoS in Java TLS x509 AIA Extension
Blind SSRF/DoS in Java TLS x509 AIA Extension A Blind Server-Side Request Forgery (SSRF) vulnerability exists in Oracle Java 21. The vulnerability, which leads...
Fall 2025 SOC 1, 2, and 3 reports are now available with 185 services...
Amazon Web Services (AWS) is pleased to announce that the Fall 2025 System and Organization Controls (SOC) 1, 2, and 3 reports are now available....
New iOS and iPadOS Flaws Leave Millions of iPhones at Risk
Critical iOS and iPadOS WebKit flaws put millions of iPhones and iPads at risk of silent takeover. Apple urges users to update immediately.
The post...
Sprocket Security Appoints Eric Sheridan as Chief Technology Officer
Madison, United States, January 20th, 2026, CyberNewsWire Veteran cybersecurity leader brings decades of experience and patented innovation to advance the next generation of proactive...
Chainlit Security Flaws Highlight Infrastructure Risks in AI Apps
2 security vulnerabilities in the Chainlit framework expose risks from web flaws in AI applications - Read more
AI slop pushes data governance towards zero-trust models
Organisations are beginning to implement zero-trust models for data governance thanks to the proliferation of poor quality AI-generated data, often known as AI slop....
Delta Electronics DIAView Multiple Vulnerabilities
Delta Electronics DIAView Multiple Vulnerabilities CVE-2025-62581 - Hard-coded JWT Secret Key (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)DIAView uses a hardcoded secret key.CVE-2025-62582 - Unauthenticated Remote Database Access (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)An unauthenticated...
Fünf Chrome-Erweiterungen, die Unternehmenssitzungen kapern
Forscher haben fünf bösartige Chrome-Erweiterungen entdeckt.T. Schneider – shutterstock.com Forscher des Security-Anbieters Socket haben eine koordinierte Kampagne entdeckt, die auf...









