Content Paint

cybersecurity

F5 admits major sustained breach. Source code, undisclosed vulns. stolen

"If compromised keys were stolen, and F5 hasn’t ruled that out, malicious software updates signed by ‘F5’ could be indistinguishable from the real thing."

Patch Tuesday: Windows users hacked due to legacy fax modem driver

Three 0days and a pre-auth RCE (CVSS 9.8) in Windows Server Update Service that deserves urgent attention

Was this DEFCON eBPF bug talk hallucinated?

Updated at 2:26 p.m. on October 15, 2025 to remove an incorrect reference by Chris Wyosopal to kernel structs and verifier hooks in the presentation example code. In August, a relatively unknown security researcher named Agostino “Van1sh” Panico gave a talk at hacking conference Defcon. The 45-slide deck

red hat files red hat breach

"inventories, hosts, Ansible playbooks, OpenShift install blueprints, CI/CD runners, VPN profiles, Quay/registry configs, Vault integrations, backups"

Oracle pushes emergency weekend patch amid 0day exploitation

No password needed to gain access to key component of EBS thanks to new bug

Cloud hyperscalers team up for a $4.5M bug bounty competition – but not without a little drama

New cloud hacking competition comes with strict IP rules and copycat claims.

Expired cyber security act could spell trouble downstream for CISA KEV

Less reporting to CISA is not good news for anyone

Home Office orders Apple to make them a backdoor – again

UK government asks for another back door, to a collective groan from infosec community.

New Anthropic CISO Vitaly Gudanets

Existing CISO stays on as his deputy.

Search the site

Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Great! You've successfully signed up.
Great! You've successfully signed up.
Welcome back! You've successfully signed in.
Success! You now have access to additional content.