Cybersecurity News
By Gary S. Miliefsky, Publisher of Cyber Defense Magazine Introduction In late 2024, cybercriminals breached Ahold Delhaize USA Services, LLC, […]
Microsoft is replacing the BSOD error with a black design in Windows 11 to speed recovery and strengthen resilience after […]
US prosecutors allege Kai West led a years-long hacking scheme as “IntelBroker,” breaching more than 40 networks and causing $25M […]
Tips on what to do if you find a mop of squid eggs. As usual, you can also use this […]
Brother Industries is grappling with a critical authentication bypass vulnerability affecting hundreds of different printer models, many of them used […]
The US airline said that incident was affecting some of its IT systems, but flights are continuing to operate safely […]
Drucker und Scanner werden dank einer Schwachstelle in der Microsoft 365 Direct Send-Funktion zunehmend zu Mitteln für Hacker, um Phishing-Angriffe […]
Fake crypto and TikTok apps are being used to spread SparkKitty spyware on Android and iOS, silently stealing user photos […]
As generative artificial intelligence (genAI) redefines enterprise operations, governance, risk and compliance (GRC) functions sit at the intersection of transformation […]
A critical authentication bypass by spoofing vulnerability in AMI MegaRAC SPx server management firmware is now being actively exploited by […]
Misconfigured AI-linked MCP servers are exposing users to data breaches and remote code execution threats Read More
If the term “cyber threat” alone is enough to make any company nervous, imagine a sophisticated cyberattack designed not only […]
-Shweta Sharma A US court indicted a man accused of being IntelBroker, a key administrator of stolen data marketplace BreachForums, […]
Microsoft’s Extended Security Updates program will deliver paid patches for Windows 10 after Oct. 14, 2025, but only for version […]
The threat actor used a combination of open-source and publicly available tools to establish their attack framework Read More
NSA and CISA are urging developers to adopt memory safe languages (MSLs) to combat vulnerabilities in software Read More
Picture this: You’ve just arrived at a bustling airport, exhausted from your journey but excited for your vacation. While waiting […]
A representative of NCSC-FI shared some lessons learned from a 2024 data breach affecting the Finnish capital Read More
By James Hess – CEO and Co-Founder, Unknown Cyber In today’s world, military strength is no longer defined solely by […]
A long-running malware campaign targeting WordPress via a rogue plugin has been observed skimming data, stealing credentials and user profiling […]
Time is a luxury few of us can afford to waste. Decision-makers often find themselves sifting through mountains of information, […]
Data breach at McLaren Health Care affecting over 743,000 individuals has been linked to a ransomware attack Read More
A cyber-attack by pro-Iranian group Cyber Fattah has leaked personal information from the Saudi Games online Read More
The cybersecurity world is on the brink of a revolution, driven by quantum computing. Quantum computers can also break the […]
A cyber-attack on CoinMarketCap exposed users to a fake Web3 wallet prompt, draining $43,266 from wallets Read More
CISOs mit einem MCP-Server von Asana in ihrer Umgebung sollten ihre Protokolle und Metadaten auf Datenlecks überprüfen. Shutter z – […]
There are multiple initiatives in the USA and European Union to regulate the Open-source AI use – from an ethics […]
In today’s rapidly evolving and complex threat environment, the cybersecurity industry is reaching a point where scale, comprehensive capabilities, and […]
Organizations worldwide rely on technology to function. By 2027, global spending on digital transformation is projected to reach nearly $4 trillion, […]
The CEO of Nokia, on the eve of being purchased by Microsoft, said “we didn’t do anything wrong but somehow, […]
The cybersecurity industry is in constant flux, driven by escalating threats, emerging technologies, and strategic market maneuvers. This dynamic environment, […]
This is the first ever video of the Antarctic Gonate Squid. As usual, you can also use this squid post […]
Remote attackers can trigger an avalanche of internal ESI requests, exhausting memory and causing denial-of-service in Apache Traffic Server. Executive […]
Researchers at Cybernews claim that, of the 30 exposed datasets, only one record has been reported on previously. Read More
The cybersecurity landscape of 2024 has revealed an unprecedented surge in both the frequency and sophistication of data breaches, setting […]
The UK’s Cyber Monitoring Centre (CMC) assessed the incident as a Category 2 systemic event, based on the significant economic […]
Deepfakes are the exciting new thing in cyber security, but at their core they are not a new threat – […]
Cybersecurity’s Enduring Guardians: ESET’s 35-Year Journey of Threat Intelligence The Berlin Wall crumbled, and from its digital shadows emerged a […]
Another threat group has started abusing the Cloudflare Tunnel service to get phishing emails into targeted organizations without activating conventional […]
For many years, cybersecurity professionals have relied on Indicators of Compromise (IOCs) such as IP addresses, domain names, and file […]
Banana Squad exploited GitHub to distribute malicious Python code disguised as legitimate tools Read More
Python RAT PylangGhost, linked to Famous Chollima, targeted crypto professionals via fake job sites Read More
As we continue to evolve the field of AI, a new branch that has been accelerating recently is Agentic AI. […]
New SEO poisoning attacks identified, using Hacklink to hijack search rankings and inject malicious links into sites Read More
The Global Supply Chain Is Already on Fire — We Just Don’t See the Smoke. The global supply chain is […]
This blog uncovers an active campaign exploiting CVE-2025-3248 in Langflow versions before 1.3.0 that deploys the Flodrix botnet, enabling threat […]
Cyber-attacks using HijackLoader and DeerStealer have been identified exploiting phishing tactics via ClickFix Read More
Abstract Money laundering is a major financial crime that involves introducing illicitly obtained funds into legitimate financial systems to disguise […]
Operation DEEP Sentinel has shut down Archetyp Market, the longest-running dark web drug marketplace Read More
Executive Summary Quantum computing’s rapid progress poses a significant threat, potentially rendering current encryption methods and nearly all encrypted data […]
Data breach costs are rising at breakneck speed. IBM reported that the global average security breach cost is $4.9 million, marking […]
According to a recent report released by the Multi-State Information Sharing and Analysis Center, governmental agencies are facing an increase in […]
This is a current list of where and when I am scheduled to speak: I’m speaking at the International Conference […]
Digital transformation in manufacturing has opened doors to promising possibilities, but not without new risk exposure. With expansive transformation comes […]
Cybersecurity professional organization ISC2 found hiring managers prize teamwork, problem-solving, and analytical thinking in early-career employees. Read More
Video of the stubby squid (Rossia pacifica) from offshore Vancouver Island. As usual, you can also use this squid post […]
INTERPOL partnered with Group-IB, Kaspersky, and Trend Micro to take down a cybercrime network. They alerted more than 216,000 individuals […]
Jen Easterly and Ciaran Martin called for a universal, vendor-neutral cyber threat actor naming system Read More
Security researchers uncovered “EchoLeak,” a zero-click flaw in Microsoft 365 Copilot, exposing sensitive data without user action. Microsoft has mitigated […]
Die Serviettenfabrik Fasana ist Opfer eines Cyberangriffs. Fasana GmbH Wie der Westdeutsche Rundfunk (WDR) berichtet, wurde der Serviettenhersteller Fasana Ende […]
Fog ransomware hackers, known for targeting US educational institutions, are now using legitimate employee monitoring software Syteca, and several open-source […]
A new vulnerability in GitLab’s Community and Enterprise Editions used for managing source code is “dangerous” and needs to be […]
Interpol, together with 26 countries and several cybersecurity companies, has carried out a major international operation against so-called infostealers — […]
This is news: A data broker owned by the country’s major airlines, including Delta, American Airlines, and United, collected U.S. […]
For more than a decade, the CSO Awards have recognized security projects that demonstrate outstanding thought leadership and business value. The […]
Now entering its seventh year, the CSO Hall of Fame spotlights outstanding leaders who have significantly contributed to the practice […]
If you’re an AT&T customer, now’s the time to take action. A massive data breach has exposed personal information from […]
Android Enterprise has introduced features for mobile security, device management and user productivity in its latest update Read More
A ransomware attack on Mastery Schools, Philadelphia, has compromised personal information of 37,031 individuals, exposing sensitive data Read More
Available to the public and debuting at the Gartner Security & Risk Management Summit, BrowserTotal is a first of its kind […]
The financial sector was the industry most targeted by distributed denial-of-service (DDoS) attacks in 2024, with a peak in October […]
Two malicious npm packages have been found posing as legitimate utilities to silently install backdoors for complete production wipeout. According […]
Vulnerability in PayU CommercePro plugin allows account hijacking on thousands of WordPress sites Read More
Dutch and Iranian security researchers have created an automated genAI tool that can scan huge open source repositories and patch […]
New PathWiper malware targeted Ukrainian critical infrastructure, using legitimate tools for cyber-attacks Read More
Seemingly harmless Chrome extensions aimed at improving browser privacy and analytics could be inadvertently leaking API keys, secrets, and other […]
You can have the best firewalls, airtight encryption and the latest SIEM tools. But if your clocks are off, you’re […]
Southern New England is having the best squid run in years. As usual, you can also use this squid post […]
On Thursday I testified before the House Committee on Oversight and Government Reform at a hearing titled “The Federal Government […]
The Play ransomware group has hit about 900 organizations globally so far and uses “double extortion” after data theft. Read […]
OpenAI just published its annual report on malicious uses of AI. By using AI as a force multiplier for our […]
The ransomware group combines IT vendor impersonation and phishing frameworks like Evilginx to breach its targets Read More
Microsoft will die Cybersicherheit in Europa stärken. MeshCube – shutterstock.com Microsoft warnt davor, dass sich Ransomware-Gruppen und staatlich geförderte Akteure […]
2017 ransomware attack on shipping company A P Moller Maersk marked a turning point for the cybersecurity industry, according to […]
Since the start of the Trump administration, the US federal government’s two top cybersecurity leadership positions have been vacant, but […]
During Infosecurity Europe 2025, Nick Woodcraft, from the UK Government, shared his experience in implementing measures to protect domains within […]
Engagement with ransomware actors doesn’t necessarily mean payment; it’s about getting the best outcomes, a leading negotiator had argued Read […]
A panel of CISOs at Infosecurity Europe urged their peers to use risk management and clear communication to tame a […]
Will Massive Security Glossary From Microsoft, Google, CrowdStrike, Palo Alto Improve Collaboration?
“This effort is not about creating a single naming standard,” said Vasu Jakkal, corporate vice president of Microsoft Security. Read […]
Moving to cloud-native architecture and modern platforms is allowing enterprises to automate operations and improve security Read More
Experts argue the case for “communities of support” to boost SMB cyber-resilience Read More
Experts argue that CISOs should avoid product duplication and simplify their language to ensure budget is spent wisely Read More
In an active campaign, a financially motivated threat actor is voice phishing (Vishing) Salesforce customers to compromise their organizational data […]
Resellers and channel partners can add value, fill gaps in security teams and offer expertise in niche markets Read More
Apple is appealing EU demands to open iOS to third-party devices, arguing interoperability threatens privacy, security, and user experience. Read […]
Effective cybersecurity played a key role Ukraine drone attack on Russian strategic bombers, a leading government security expert has claimed […]
CISA is facing $495m budget cut, losing 1000 employees and reducing staff to 2324 Read More
CISOs should demand more of their vendors and use regulation as an ally to persuade board members to accelerate the […]
Download the June 2025 issue of the Enterprise Spotlight from the editors of CIO, Computerworld, CSO, InfoWorld, and Network World. […]
Two local information disclosure flaws in Linux crash-reporting tools have been identified exposing system data to attackers Read More