SK Telecom hacked “CoinbaseCartel” threaten to leak source code this week

The new hacking group, which claimed to have stolen confidential source code and sensitive project files from SK Telecom last month, is now threatening to leak that data if the telecommunications giant doesn’t start negotiations. The previously unheard-of ransomware group, CoinbaseCartel, apparently hoping to garner attention for itself and get a ransom payout from the…

Read More

Red Hat confirms security incident after hackers breach GitLab instance

 Crimson Collective, cyber criminal gang claims to have stolen nearly 570GB of compressed data across 28,000 internal development respositories, with the company confirming it was a breach of one of its GitLab instances. This data allegedly includes approximately 800 Customer Engagement Reports (CERs), which can contain sensitive information about a customer’s network and platforms. Red…

Read More

NETSCOUT HELPS REDUCE FIBER-TO-THE-HOME COSTS AND CUSTOMER CHURN

NetScout announced its solutions to support cable providers and multiple service operators (MSOs) in improving their ability to deliver an exceptional customer experience while reducing costs.   Competition is driving the development of new methods for delivering content more efficiently and effectively. Streaming entertainment, gaming and interactive content, and home automation continue to drive demand…

Read More

Securonix is transforming SecOps with Agentic AI through intelligent agents; Dipesh kaura, Securonix

Recently Securitydive spoke to Dipesh Kaura serves as the Country Director for India & SAARC at Securonix. As threat landscape expand so are offerings to secure enterprise. With AI poised as an integral part of cyber threats, organizations have shifted their investments following this trend, with a focus on AI-based defenses against cyberattacks. The demand…

Read More

UAE Cyber Security Council warns 1.4 billion accounts hacked monthly worldwide

The UAE Cybersecurity Council has warned the public against the dangers of neglecting personal digital footprints, cautioning that every login, post, or interaction online leaves behind a trail that can be exploited by hackers or untrustworthy applications. In a statement carried by the Emirates News Agency (WAM), the council noted that more than 1.4 billion…

Read More

FBI Unveils IOCs for Cyber Attacks Targeting Salesforce Instances for Data Exfiltration

The Federal Bureau of Investigation (FBI) has released a flash alert detailing the activities of two cybercriminal groups, UNC6040 & UNC6395, that are actively compromising Salesforce environments to steal data for extortion purposes. The advisory, published by the FBI on September 12, 2025, provides indicators of compromise (IOCs) and defensive measures to help organizations protect…

Read More

Cyber attackers use images & built-in tools to bypass defences

Research from HP Wolf Security has found that cyber attackers are continually refining established tactics in order to evade security measures and deceive users. Living-off-the-land tactics The HP Threat Insights Report describes an increasing trend in the use of “living-off-the-land” (LOTL) techniques, whereby cybercriminals utilise legitimate tools and features within the operating system to carry…

Read More

Cognizant Appoints Vishal Salvi as Global Head of Cyber Security

Cognizant has been  appointed Vishal Salvi as the Global Head of Cyber Security Service-Line. This is  a strategic move to reinforce its cybersecurity leadership and he will now drive global initiatives to strengthen enterprise security and resilience. Vishal is a well-known global leader and he comes with extensive management and domain experience in driving transformation and cybersecurity…

Read More

Security by design starts at the whiteboard stage: Srinivas Shekar, CEO, Pantherun Technologies

Pantherun Technologies was founded by Srinivas Shekar (CEO) and Tiffany Chan (COO). It was officially launched on 25th September 2019 and is headquartered out of Bangalore, with offices in Germany, Taiwan and the United States. Security by design starts at the whiteboard stage & security needs to be part of the first conversation: What sets…

Read More