Google Mandiant Probes New Oracle Extortion Wave Possibly Linked to Cl0p Ransomware

Oct 02, 2025Ravie LakshmananRansomware / Threat Intelligence Google Mandiant and Google Threat Intelligence Group (GTIG) have disclosed that they are tracking a new cluster of activity possibly linked to a financially motivated threat actor known as Cl0p. The malicious activity involves sending extortion emails to executives at various organizations and claiming to have stolen sensitive…

Read More

Huawei powers first Monetised fan network

The roar of 80,000 fans at Shanghai Stadium on September 21, 2025, wasn’t just about the football match between Shanghai Shenhua and Chengdu Rongcheng – it was also a live demonstration of how telecom carriers are tackling one of their most pressing challenges: converting advanced network capabilities into revenue. Huawei brought the international media to…

Read More

    Flipkart’s Super.money quietly partners with troubled Juspay as it expands its reach

    Super.money, a financial service platform spun off last year by Walmart-owned Flipkart, has quietly partnered with payments infrastructure firm Juspay as it expands into direct-to-consumer (D2C) checkout and targets $100 million in annual revenue by 2026. The partnership comes as Juspay works to rebuild momentum after facing pushback from major payment companies earlier this year…

    Read More

    New WireTap Attack Extracts Intel SGX ECDSA Key via DDR4 Memory-Bus Interposer

    Oct 01, 2025Ravie LakshmananEncryption / Hardware Security In yet another piece of research, academics from Georgia Institute of Technology and Purdue University have demonstrated that the security guarantees offered by Intel’s Software Guard eXtensions (SGX) can be bypassed on DDR4 systems to passively decrypt sensitive data. SGX is designed as a hardware feature in Intel…

    Read More

    The 5 best AI AppSec tools in 2025

    Guest author: Or Hillel, Green Lamp Applications have become the foundation of how organisations deliver services, connect with customers, and manage important operations. Every transaction, interaction, and workflow runs on a web app, mobile interface, or API. That central role has made applications one of the most attractive and frequently-targeted points of entry for attackers….

    Read More