Weekly cybersecurity summary (week of October 20–26, 2025)

2 months ago
Emanuelle Jimenez

CVE-2025-8941: Critical privilege escalation in Linux-PAM The CVE-2025-8941 vulnerability affecting the Linux-PAM pam_namespace module was published. The issue allows local…

Piscium Security Wins First Place at the Pwned 2025 CTF Challenge

2 months ago

Piscium Security participated in Pwned 2025, Costa Rica’s premier cybersecurity event, achieving first place in the CTF Challenge and strengthening…

News of The Week October 10th

3 months ago

News of the Week: Storm of vulnerabilities In the news of the week ending October 10, 2025, are five major…

Cloud Audits: Process, Importance and Effective Planning

8 months ago

In a world increasingly dependent on cloud computing, audits have become an essential component of ensuring security, privacy and compliance.…

The Cloud Data Lifecycle

9 months ago

In today’s digital world, data is the most valuable asset of any organization. Protecting information is critical in any system,…

SORM: The Digital Surveillance Network and its Global Impact

9 months ago

Introduction The System of Operational Research Activities (SORM) represents one of the most sophisticated and controversial digital surveillance tools available…

Alerts About a New Phishing Attack Using Corrupted Files

9 months ago

The cybersecurity landscape is constantly evolving, and cybercriminals are developing increasingly sophisticated techniques to bypass protective barriers. This time, a…

What is cybersecurity?

9 months ago

Cybersecurity is the practice of protecting systems, networks, applications and data from cyber threats. Organizations implement cybersecurity to safeguard their…

The KISS Principle

9 months ago

The KISS (keep it simple, stupid or keep it stxpid simple) principle encourages designers, developers, and engineers to prioritize simplicity…

Campaigns targeting software developers through social engineering

9 months ago

The DEV#POPPER campaign continues to evolve, with North Korean threat actors now deploying malware that targets developers across Linux, Windows,…