Battering RAM: Hardware Attack Undermines Intel SGX and AMD SEV‑SNP Protections

Man in hood working on a computer amid a dramatic sunset with a shadowy figure behind.

Researchers from KU Leuven and the University of Birmingham have disclosed Battering RAM, a hardware attack that defeats key confidential computing protections in Intel SGX enclaves and AMD SEV‑SNP virtual machines. While exploitation requires physical access to the server, the work exposes design limits of today’s memory‑encryption schemes and elevates concerns about insider threats and … Read more

UK issues £1.5bn UKEF guarantee to Jaguar Land Rover after cyberattack: what it means for supply chains and cyber resilience

Silhouettes of three people against a fiery background with a burning car.

The UK government has approved a £1.5 billion credit guarantee for Jaguar Land Rover (JLR) under UK Export Finance’s Export Development Guarantee (EDG), helping stabilize supplier payments and logistics after a cyberattack forced production interruptions. The five‑year facility is designed to de‑risk bank lending so JLR can access larger financing on better terms and restart … Read more

Western Digital fixes critical My Cloud command injection (CVE-2025-30247) with firmware 5.31.108

Hand placing a checkmark on a note above a cloud storage device, amidst a cracked ground.

Western Digital has released firmware version 5.31.108 for My Cloud network-attached storage (NAS) devices to remediate CVE-2025-30247, a critical command injection vulnerability in the web-based administration interface that could enable remote code execution (RCE). The issue was disclosed to the vendor by security researcher w1th0ut. Automatic rollout began after 23 September 2025, and users are … Read more

Discord probes third-party support breach as payment and identity data exposed

Close-up of a passport next to a security lock button on a keyboard.

On 20 September 2025, Discord disclosed a security incident stemming from a compromise of a third‑party customer support provider. The breach affected a limited subset of users who had interacted with Discord’s Support or Trust & Safety teams. Exposed data includes payment information and personally identifiable information (PII) such as real names; for a smaller … Read more

MatrixPDF Builder Turns Benign PDFs into Click‑Through Phishing Lures That Bypass Gmail Filters

Man using a laptop to interact with a document management application.

Varonis researchers have identified MatrixPDF, a commercial builder that converts legitimate PDF files into interactive phishing decoys. The tool leverages native PDF capabilities—rather than embedded executables—to route users to credential‑harvesting sites or malware downloaders, enabling emails to evade common gateway checks and reach inboxes, including Gmail. What is MatrixPDF: features, positioning, and pricing Marketed as … Read more

Unity CVE-2025-59489: Critical Runtime Flaw Enables Code Execution on Android and Potential Privilege Escalation on Windows

Figure silhouetted against a fiery Unity logo in a dark, dramatic setting.

A high-severity vulnerability in the Unity Runtime, tracked as CVE-2025-59489 with a CVSS score of 8.4, exposes Unity-built apps to arbitrary code execution on Android and, under specific conditions, privilege escalation on Windows. The flaw has existed since Unity 2017.1. Vendor responses are underway: Unity has issued patches, Valve updated the Steam client, and Microsoft … Read more

Red Hat probes consulting GitLab breach as Crimson Collective claims 570 GB data theft and 800 CERs exposed

Computer screens show hacking themes with a figure in a hoodie.

Ransomware group Crimson Collective claims it stole 570 GB of data from about 28,000 internal GitLab repositories associated with Red Hat Consulting. Red Hat confirmed an incident involving a compromised, isolated GitLab instance used for consulting projects, telling BleepingComputer that there is no evidence of impact to other services, products, or the software supply chain. … Read more

Classic Outlook for Windows Crashes at Launch: Microsoft Probes Exchange Online Authentication Concurrency Limit

Split-screen showing Outlook logo and an error message about starting Outlook.

Microsoft is investigating an incident that causes the classic Outlook for Windows client to crash at startup for some Microsoft 365 customers. Affected users encounter “Cannot start Microsoft Outlook,” along with a failed sign-in to Exchange. In diagnostic traces, admins may see the string “LID: 49586 – Authentication concurrency limit is reached”, indicating a bottleneck … Read more

Google’s Developer Verification Rule Will Gate Sideloaded Apps on Certified Android Devices

Futuristic scene with a woman checking a device in a high-tech environment.

Google will require that, starting in 2026, certified Android devices (phones and tablets with Google Mobile Services and Play Protect) only install apps from verified developers. The requirement will apply not only to Google Play, but also to sideloaded apps and software distributed via alternative app stores by 2027—raising important questions for open-source ecosystems such … Read more

CometJacking: Prompt Injection in Perplexity Comet Lets Attackers Pull Data from Connected Accounts

Golden Gate Bridge rises majestically over calm waters at sunset.

Security researchers at LayerX have documented a technique they call CometJacking, where attackers embed malicious instructions in URL parameters to steer Perplexity’s agentic AI browser, Comet, into accessing its memory and connected services. In a proof-of-concept, the team demonstrated access to Gmail and Google Calendar artifacts and bypassed platform safeguards by encoding exfiltrated content in … Read more