Weekly cybersecurity summary (week of October 20–26, 2025)

3 months ago
Emanuelle Jimenez

CVE-2025-8941: Critical privilege escalation in Linux-PAM The CVE-2025-8941 vulnerability affecting the Linux-PAM pam_namespace module was published. The issue allows local…

Piscium Security Wins First Place at the Pwned 2025 CTF Challenge

3 months ago

Piscium Security participated in Pwned 2025, Costa Rica’s premier cybersecurity event, achieving first place in the CTF Challenge and strengthening…

News of The Week October 10th

3 months ago

News of the Week: Storm of vulnerabilities In the news of the week ending October 10, 2025, are five major…

Cloud Audits: Process, Importance and Effective Planning

8 months ago

In a world increasingly dependent on cloud computing, audits have become an essential component of ensuring security, privacy and compliance.…

The Cloud Data Lifecycle

10 months ago

In today’s digital world, data is the most valuable asset of any organization. Protecting information is critical in any system,…

SORM: The Digital Surveillance Network and its Global Impact

10 months ago

Introduction The System of Operational Research Activities (SORM) represents one of the most sophisticated and controversial digital surveillance tools available…

Alerts About a New Phishing Attack Using Corrupted Files

10 months ago

The cybersecurity landscape is constantly evolving, and cybercriminals are developing increasingly sophisticated techniques to bypass protective barriers. This time, a…

What is cybersecurity?

10 months ago

Cybersecurity is the practice of protecting systems, networks, applications and data from cyber threats. Organizations implement cybersecurity to safeguard their…

The KISS Principle

10 months ago

The KISS (keep it simple, stupid or keep it stxpid simple) principle encourages designers, developers, and engineers to prioritize simplicity…

Campaigns targeting software developers through social engineering

10 months ago

The DEV#POPPER campaign continues to evolve, with North Korean threat actors now deploying malware that targets developers across Linux, Windows,…