Squid Dominated the Oceans in the Late Cretaceous
New research: One reason the early years of squids has been such a mystery is because squids’ lack of hard […]
The cybersecurity community is once again sounding the alarm over a new vulnerability in Citrix NetScaler devices- this time, it’s […]
Tradecraft in the Information Age
Long article on the difficulty (impossibility?) of human spying in the age of ubiquitous digital surveillance. Read More
ISACA Addresses Experience Gap with CISA Associate Designation
The new CISA Associate designation recognizes ISACA members who have passed the CISA exam, but do not yet have the […]
A security oversight in McDonald’s AI-powered hiring platform “McHire” was found exposing sensitive applicant data belonging to as many as […]
British Man Sentenced for Network Rail Wi-Fi Hack
The man was handed a suspended prison sentence for offenses relating to the hack of Network Rail public Wi-Fi, exposing […]
LevelBlue Momentum Continues with Two Acquisitions
In late May, I wrote a blog post titled “One Year of LevelBlue: Milestones, Momentum, and a Vision for the […]
Fast Food, Weak Passwords: McDonald’s AI Hiring Tool Exposed Millions of Applicants’ Data
Olivia, the AI chatbot McDonald’s uses to streamline job application processes, exposed an estimated 64 million chat logs containing applicants’ […]
Twitter Co-Founder Launches Bitchat, a Security-Focused, Bluetooth Messaging App – No Internet Required
Learn what makes Bitchat stand out compared to other messaging apps including WhatsApp and Facebook Messenger. Read More
Perplexity’s new Comet web browser was built on a foundation of privacy. Learn about Comet’s other key features and availability. […]
LLMs Fall Short in Vulnerability Discovery and Exploitation
Forescout found that most LLMs are unreliable in vulnerability research and exploit tasks, with threat actors still skeptical about using […]
If someone called you claiming to be a government official, would you know if their voice was real? This question […]
Researchers Reveal 18 Malicious Chrome and Edge Extensions Disguised as Everyday Tools
Researchers from Koi Security have detected 18 malicious Chrome and Edge extensions masquerading as benign productivity and entertainment tools Read […]
Behind the Booking: How Bots Are Undermining Airline Revenue
The airline industry is under constant attack from malicious bots. Bad actors use automation to scrape fares, hoard inventory, commit […]
ClickFix-Attacken bedrohen Unternehmenssicherheit
Cyberkriminelle greifen immer häufiger auf ClickFix-Angriffe zurück. NAJA x -shutterstock.com Weniger bekannt als Phishing ist die Social-Engineering-Methode ClickFix. Ziel solcher […]
Check Point discovered around 500 suspected Scattered Spider phishing domains, suggesting the group is preparing to expand its targeting Read […]
How a 12-year-old bug in Sudo is still haunting Linux users
Two new vulnerabilities have been found in Sudo, a privileged command-line tool installed on Linux systems, that can allow privilege […]
Iran-aligned BladedFeline group has been observed targeting the government of Iraq and KRG with advanced malware Read More
How to Improve Computer Network Security for Your Business
Regardless of size or industry, all companies are exposed to potential cyber threats. Digitalization has brought countless benefits to today’s […]
Vulnerability research company WatchTowr published a detection analysis for the Citrix Blled 2 flaw Read More
NightEagle hackers exploit Microsoft Exchange flaw to spy on China’s strategic sectors
A previously undocumented Advanced Persistent Threat (APT) group, “NightEagle,” has been found targeting the Chinese government and critical sectors using […]
Ingram Micro is facing a major cybersecurity crisis as a ransomware attack has triggered a multi-day IT outage, disrupting services […]
Friday Squid Blogging: How Squid Skin Distorts Light
New research. As usual, you can also use this squid post to talk about the security stories in the news […]
Developers across popular integrated development environments (IDEs) like Visual Studio Code, Visual Studio, IntelliJ IDEA, and Cursor are at risk […]
Why Most Providers Still Leave You Exposed Cloud infrastructure has become foundational for modern operations, but it also continues to […]
Some admins of Hunters International are now part of the encryption-less cyber extortion group World Leaks Read More
In the world of cybersecurity, there’s always a new buzzword, but some trends are more than just hype. Over the […]
Kritische Schwachstelle in Cisco Unified CM entdeckt
Bereits zum zweiten Mal in einer Woche muss Cisco eine Schwachstelle mit höchsten Schweregrad melden. JarTee – shutterstock.com Cisco meldete […]
Hunters International shuts ransomware operations, reportedly becomes an extortion-only gang called World Leaks
Ransomware gang Hunters International says it’s shutting down its operations for unexplained reasons, and is offering decryption keys to victim […]
A critical Azure Machine Learning flaw allows privilege escalation, risking subscription compromise Read More
The CVE Board has launched a Consumer Working Group and a Researcher Working Group, allowing new stakeholders to shape the […]
Cisco (Nasdaq:CSCO) has patched a max severity flaw in its Unified Communications Manager (Unified CM) and Session Management Edition (Unified […]
Erneute Cyberattacke auf Internationalen Strafgerichtshof
Der Internationale Strafgerichtshof wurde bereists zum zweiten Mal von einer Cyberattacke getroffen. Nominesine – shutterstock.com Der Internationale Strafgerichtshof (IStGH) ist […]
Incidents of ClickFix — the social engineering attack technique that tricks users into executing malicious code — are skyrocketing. ClickFix […]
Android SMS Stealer Infects 100,000 Devices in Uzbekistan
New Android malware Qwizzserial has infected 100,000 devices, primarily in Uzbekistan, stealing SMS data via Telegram distribution Read More
AI Models Mislead Users on Login URLs
A third of AI-generated login URLs lead to incorrect or dangerous domains, according to Netcraft Read More
Auf der Suche nach Alternativen zum CVE-Programm
Sollte das CVE-Programm eingestellt werden, wäre die Bewertung und Behebung von Sicherheitslücken schwieriger. Dave Hoeek – shutterstock.com Der jüngste kurze […]
Second espionage-linked cyberattack hits ICC, exposing persistent threats to global justice systems
The International Criminal Court (ICC) has fallen victim to another sophisticated cyberattack, the second major cyber espionage attempt targeting the […]
Cloudflare Now Blocks AI Web Scraping by Default
Cloudflare now blocks AI web crawlers by default, requiring permission from site owners for access Read More
Google has patched a critical type confusion vulnerability in Chrome, the fourth zero-day fix in 2025 Read More
Proofpoint has identified similarities between the tactics of a pro-Russian cyber espionage group and a cybercriminal gang Read More
The ICC said the new incident was the second “of its type” it has faced in recent years, relating to […]
Ransomware-Attacke auf Welthungerhilfe
srcset=”https://b2b-contenthub.com/wp-content/uploads/2025/07/shutterstock_2183269825.jpg?quality=50&strip=all 8256w, https://b2b-contenthub.com/wp-content/uploads/2025/07/shutterstock_2183269825.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2025/07/shutterstock_2183269825.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2025/07/shutterstock_2183269825.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2025/07/shutterstock_2183269825.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2025/07/shutterstock_2183269825.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2025/07/shutterstock_2183269825.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2025/07/shutterstock_2183269825.jpg?resize=150%2C84&quality=50&strip=all 150w, https://b2b-contenthub.com/wp-content/uploads/2025/07/shutterstock_2183269825.jpg?resize=854%2C480&quality=50&strip=all 854w, https://b2b-contenthub.com/wp-content/uploads/2025/07/shutterstock_2183269825.jpg?resize=640%2C360&quality=50&strip=all 640w, […]
International Taskforce Dismantles €460m Crypto Fraud Network
A €460m cryptocurrency fraud scheme has been disrupted by authorities, leading to five arrests in Spain Read More
US Defense Industrial Base (DIB) companies are “at increased risk” of cyber-attacks from Iran-aligned hacking groups Read More
Ahold Delhaize has confirmed a cyber-attack exposed personal data of over 2.2 million individuals in the US Read More
Scattered Spider nimmt Luftfahrtbranche ins Visier
Scattered Spider nutzt Social Engineering statt Brute Force um sich Zugang zu verschaffen. VZ_Art – shutterstock.com Die Cybersecurity-Anbieter Mandiant und […]
Did you know the average cost of IT downtime is over $5,000 per minute? Despite this staggering figure, many organizations […]
By Gary S. Miliefsky, Publisher of Cyber Defense Magazine Introduction In late 2024, cybercriminals breached Ahold Delhaize USA Services, LLC, […]
Microsoft is replacing the BSOD error with a black design in Windows 11 to speed recovery and strengthen resilience after […]
US prosecutors allege Kai West led a years-long hacking scheme as “IntelBroker,” breaching more than 40 networks and causing $25M […]
Tips on what to do if you find a mop of squid eggs. As usual, you can also use this […]
Some Brother printers have a remote code execution vulnerability, and they can’t fix it
Brother Industries is grappling with a critical authentication bypass vulnerability affecting hundreds of different printer models, many of them used […]
Hawaiian Airlines Hit by Cybersecurity Incident
The US airline said that incident was affecting some of its IT systems, but flights are continuing to operate safely […]
Microsoft-Lücke ermöglicht E-Mail-Versand ohne Authentifizierung
Drucker und Scanner werden dank einer Schwachstelle in der Microsoft 365 Direct Send-Funktion zunehmend zu Mitteln für Hacker, um Phishing-Angriffe […]
Fake crypto and TikTok apps are being used to spread SparkKitty spyware on Android and iOS, silently stealing user photos […]
As generative artificial intelligence (genAI) redefines enterprise operations, governance, risk and compliance (GRC) functions sit at the intersection of transformation […]
A critical authentication bypass by spoofing vulnerability in AMI MegaRAC SPx server management firmware is now being actively exploited by […]
Hundreds of MCP Servers at Risk of RCE and Data Leaks
Misconfigured AI-linked MCP servers are exposing users to data breaches and remote code execution threats Read More
What Is an Advanced Persistent Threat (APT)?
If the term “cyber threat” alone is enough to make any company nervous, imagine a sophisticated cyberattack designed not only […]
-Shweta Sharma A US court indicted a man accused of being IntelBroker, a key administrator of stolen data marketplace BreachForums, […]
Microsoft’s Extended Security Updates program will deliver paid patches for Windows 10 after Oct. 14, 2025, but only for version […]
Hackers Use Open-Source Offensive Cyber Tools to Attack Financial Businesses in Africa
The threat actor used a combination of open-source and publicly available tools to establish their attack framework Read More
NSA and CISA Urge Adoption of Memory Safe Languages for Safety
NSA and CISA are urging developers to adopt memory safe languages (MSLs) to combat vulnerabilities in software Read More
Why Public Wi-Fi at Tourist Hotspots is a Goldmine for Hackers
Picture this: You’ve just arrived at a bustling airport, exhausted from your journey but excited for your vacation. While waiting […]
A representative of NCSC-FI shared some lessons learned from a 2024 data breach affecting the Finnish capital Read More
The Hidden Front: Iran, Cyber Warfare, and the Looming Threat to U.S. Critical Infrastructure
By James Hess – CEO and Co-Founder, Unknown Cyber In today’s world, military strength is no longer defined solely by […]
A long-running malware campaign targeting WordPress via a rogue plugin has been observed skimming data, stealing credentials and user profiling […]
TLDR* May Work for EULAs But Your Contracts?
Time is a luxury few of us can afford to waste. Decision-makers often find themselves sifting through mountains of information, […]
Mclaren Health Care Data Breach Impacts Over 743,000 Patients
Data breach at McLaren Health Care affecting over 743,000 individuals has been linked to a ransomware attack Read More
A cyber-attack by pro-Iranian group Cyber Fattah has leaked personal information from the Saudi Games online Read More
Zero-Trust Architecture in the Era of Quantum Computing: A Proactive Defense Strategy
The cybersecurity world is on the brink of a revolution, driven by quantum computing. Quantum computers can also break the […]
Fake Web3 Wallet Prompt Steals $43,000 from CoinMarketCap Users
A cyber-attack on CoinMarketCap exposed users to a fake Web3 wallet prompt, draining $43,266 from wallets Read More
MCP-Bug bei Asana könnte Unternehmensdaten offengelegt haben
CISOs mit einem MCP-Server von Asana in ihrer Umgebung sollten ihre Protokolle und Metadaten auf Datenlecks überprüfen. Shutter z – […]
There are multiple initiatives in the USA and European Union to regulate the Open-source AI use – from an ethics […]
Why Scale Matters in Today’s Cybersecurity Landscape Futureproofing for Better Outcomes
In today’s rapidly evolving and complex threat environment, the cybersecurity industry is reaching a point where scale, comprehensive capabilities, and […]
Organizations worldwide rely on technology to function. By 2027, global spending on digital transformation is projected to reach nearly $4 trillion, […]
Why CISOs Need an AI-Native Strategy
The CEO of Nokia, on the eve of being purchased by Microsoft, said “we didn’t do anything wrong but somehow, […]
The Evolving Cloud Security Landscape: Empowering Startups in a Post-Acquisition World
The cybersecurity industry is in constant flux, driven by escalating threats, emerging technologies, and strategic market maneuvers. This dynamic environment, […]
Friday Squid Blogging: Gonate Squid Video
This is the first ever video of the Antarctic Gonate Squid. As usual, you can also use this squid post […]
CVE-2025-49763 – Remote DoS via Memory Exhaustion in Apache Traffic Server via ESI Plugin
Remote attackers can trigger an avalanche of internal ESI requests, exhausting memory and causing denial-of-service in Apache Traffic Server. Executive […]
Researchers at Cybernews claim that, of the 30 exposed datasets, only one record has been reported on previously. Read More
The cybersecurity landscape of 2024 has revealed an unprecedented surge in both the frequency and sophistication of data breaches, setting […]
M&S and Co-op Hacks Classified as Single Cyber Event
The UK’s Cyber Monitoring Centre (CMC) assessed the incident as a Category 2 systemic event, based on the significant economic […]
The Rising Deepfake Risk for Businesses: A Step-By-Step Defense Strategy Built Around the Basics of Security
Deepfakes are the exciting new thing in cyber security, but at their core they are not a new threat – […]
Innovator Spotlight: ESET
Cybersecurity’s Enduring Guardians: ESET’s 35-Year Journey of Threat Intelligence The Berlin Wall crumbled, and from its digital shadows emerged a […]
Another threat group has started abusing the Cloudflare Tunnel service to get phishing emails into targeted organizations without activating conventional […]
The Rise of Identity Risk Intelligence
For many years, cybersecurity professionals have relied on Indicators of Compromise (IOCs) such as IP addresses, domain names, and file […]
Banana Squad’s Stealthy GitHub Malware Campaign Targets Devs
Banana Squad exploited GitHub to distribute malicious Python code disguised as legitimate tools Read More
North Korean Hackers Deploy Python-Based Trojan Targeting Crypto
Python RAT PylangGhost, linked to Famous Chollima, targeted crypto professionals via fake job sites Read More
As we continue to evolve the field of AI, a new branch that has been accelerating recently is Agentic AI. […]
Hacklink Marketplace Fuels Surge in Covert SEO Poisoning Attacks
New SEO poisoning attacks identified, using Hacklink to hijack search rankings and inject malicious links into sites Read More
The Global Supply Chain Is Already on Fire — We Just Don’t See the Smoke. The global supply chain is […]
Critical Langflow Vulnerability (CVE-2025-3248) Actively Exploited to Deliver Flodrix Botnet
This blog uncovers an active campaign exploiting CVE-2025-3248 in Langflow versions before 1.3.0 that deploys the Flodrix botnet, enabling threat […]
Threat Actors Target Victims with HijackLoader and DeerStealer
Cyber-attacks using HijackLoader and DeerStealer have been identified exploiting phishing tactics via ClickFix Read More
Ongoing Money Laundering Insights
Abstract Money laundering is a major financial crime that involves introducing illicitly obtained funds into legitimate financial systems to disguise […]
Operation DEEP Sentinel has shut down Archetyp Market, the longest-running dark web drug marketplace Read More
The Impact of Quantum Decryption
Executive Summary Quantum computing’s rapid progress poses a significant threat, potentially rendering current encryption methods and nearly all encrypted data […]
The Growing Threat of AI-powered Cyberattacks in 2025
Data breach costs are rising at breakneck speed. IBM reported that the global average security breach cost is $4.9 million, marking […]
The Cost of Ignoring Patches: How State and Local Governments Can Mitigate Damaging Security Breaches
According to a recent report released by the Multi-State Information Sharing and Analysis Center, governmental agencies are facing an increase in […]