Hackers exploit SAP NetWeaver to deploy Linux Auto-Color malware.

Hackers exploit SAP NetWeaver to deploy Linux Auto-Color malware.

Security researchers have uncovered an advanced cyberattack campaign leveraging a critical vulnerability in SAP NetWeaver (CVE-2025-31324) to deploy a stealthy Linux backdoor known as Auto-Color. The campaign, which surfaced after a targeted attack on a US-based chemicals company in April 2025, highlights the growing threat landscape facing enterprise software platforms.
When it comes to Agentic AI, the framework to watch is AGNTCY.

When it comes to Agentic AI, the framework to watch is AGNTCY.

As artificial intelligence evolves, the need for interoperable, agent-driven systems has become pressing. A standard for AI agents to "talk" to each other is needed. AGNTCY directly addresses the lack of standardization hindering multi-agent collaboration. In March 2025, Cisco took a decisive step toward shaping the future of artificial intelligence by open-sourcing AGNTCY.
SarangTrap, a sophisticated cross-platform threat targets Android and iOS mobile users.

SarangTrap, a sophisticated cross-platform threat targets Android and iOS mobile users.

Security researchers at Zimperium zLabs have identified a dangerous new cross-platform malware campaign codenamed “SarangTrap,” designed to target both Android and iOS mobile users. This emerging threat leverages advanced technical methods and psychological manipulation, making it one of the most insidious campaigns seen in recent months.
Intruder unveils GregAI, an AI-powered security analyst to help organizations respond to security threats.

Intruder unveils GregAI, an AI-powered security analyst to help organizations respond to security threats.

Cybersecurity vendor Intruder has announced the launch of GregAI, an advanced AI-powered security analyst designed to revolutionize how organizations manage and respond to security threats. GregAI seamlessly integrates with Intruder’s renowned exposure management platform, delivering contextual, real-time security workflow management tailored to each customer’s unique environment.