Data Breach Ransomware0 Min Read September 16, 2025 Gucci and Alexander McQueen Hit by Customer Data Breach Luxury fashion brands Gucci, Alexander McQueen and Balenciaga have suffered a customer data breach, in another attack linked to the…
Cloud Security Data Breach Ransomware4 Min Read September 16, 2025 Bridging the Cybersecurity Talent Gap There’s no doubt about it. Cybersecurity incidents are rising. In 2024, the FBI reported a 9% increase in ransomware…
Exploits ICS/OT Malware Ransomware8 Min Read September 16, 2025 Digital Transformation Failures: A National Security Crisis in the Making In the hyperconnected world, digital transformation has become synonymous with progress, efficiency and innovation. For governments, business…
Network Ransomware Vulnerabilities Windows3 Min Read September 16, 2025 Ransomware attackers used incorrectly stored recovery codes to disable EDR agents All target organizations are different, but ransomware attackers are highly adaptive and appreciate – and will exploit – any…
Phishing Ransomware Social Engineering0 Min Read September 16, 2025 UK: Tax Refund-Themed Phishing Slows in 2025 Phishing reports impersonating HM Revenue & Customs (HMRC), the British national tax authority, appear to be slowing, according to a new…
Apple Malware Ransomware1 Min Read September 16, 2025 Apple Ends iCloud Support for Older Devices According to Apple’s newly published support documentation, devices running iOS 10 or macOS 10.12 no longer meet the minimum system…
Ransomware Supply Chain0 Min Read September 16, 2025 JLR Extends Production Halt After Cyber-Attack Jaguar Land Rover (JLR) has confirmed it will extend its production pause until at least September 24 following a cyber-attack earlier this…
Linux Ransomware Vulnerabilities Windows8 Min Read September 16, 2025 Nessus vs Metasploit Comparison: How To Exploit Vulnerabilities Using These Powerful Tools The cybersecurity landscape demands sophisticated tools to identify and exploit vulnerabilities effectively, with Nessus vs Metasploit…
DDoS Linux Ransomware Vulnerabilities2 Min Read September 16, 2025 Apple Releases iOS 26: Key Updates and Vulnerability Patches On September 15, 2025, Apple officially rolled out iOS 26 and iPadOS 26, bringing a fresh set of features and critical security fixes aimed at…
Data Breach Phishing Ransomware Vulnerabilities8 Min Read September 16, 2025 RevengeHotels: a new wave of attacks leveraging LLMs and VenomRAT Background RevengeHotels, also known as TA558, is a threat group that has been active since 2015, stealing credit card data from hotel guests…
DDoS Malware Ransomware Vulnerabilities0 Min Read September 16, 2025 API Threats Surge to 40,000 Incidents in 1H 2025 The financial services, telecoms and travel sectors were in the crosshairs of threat actors in the first half of the year, after Thales…
Malware Ransomware Vulnerabilities Windows2 Min Read September 15, 2025 HybridPetya Mimics NotPetya, Adds UEFI Compromise A newly identified ransomware strain called HybridPetya has appeared on the VirusTotal platform. Uploaded in February 2025, the sample showed…
Malware Phishing Ransomware Vulnerabilities9 Min Read September 15, 2025 Securing Linux Systems in the Age of AI: Unified Security Strategies for Modern Enterprises Introduction In the rapidly evolving landscape of cybersecurity, the integration of Artificial Intelligence (AI) has emerged as a…
Malware Phishing Ransomware Windows0 Min Read September 15, 2025 SEO Poisoning Targets Chinese Users with Fake Software Sites A search engine optimization (SEO) poisoning attack aimed at Chinese-speaking Microsoft Windows users has been identified by security…
Ransomware Supply Chain4 Min Read September 15, 2025 Preparing for the EU’s DORA amidst Technical Controls Ambiguity The financial sector is bracing for a significant shift in its digital landscape as the EU’s Digital Operational Resilience Act (DORA)…
Cloud Security Malware Ransomware Windows2 Min Read September 15, 2025 OpenAI’s New Grove Incubator Is Building the Next Generation of AI Startups OpenAI recently unveiled its internal incubation initiative, OpenAI Grove. Unlike traditional startup accelerators or incubator programs,…
Ransomware2 Min Read September 15, 2025 CISA at Risk After OIG Accuses it of Wasting Federal Funds The US Cybersecurity and Infrastructure Security Agency (CISA) wasted taxpayers’ money and imperilled its mission to protect the nation from…
Cloud Security Phishing Ransomware Windows2 Min Read September 15, 2025 Phishing Campaigns Drop RMM Tools for Remote Access Malicious actors are using multiple lures in new phishing campaigns designed to install remote monitoring and management (RMM) software onto…
Malware Phishing Ransomware Windows7 Min Read September 15, 2025 ACR Stealer – Uncovering Attack Chains, Functionalities And IOCs ACR Stealer represents one of the most sophisticated information-stealing malware families actively circulating in 2025, distinguished by its…
Exploits Ransomware Vulnerabilities2 Min Read September 15, 2025 CVE-2025-9556 (CVSS 9.8):Critical Vulnerability in LangChainGo Puts LLM Apps at Risk The rise of large language model (LLM) applications has made frameworks like LangChain and its ports foundational for developers worldwide.…
Malware Phishing Ransomware Windows3 Min Read September 15, 2025 Phishing Wave Hits U.S. Energy Giants: Chevron, ConocoPhillips Targeted The U.S. energy industry has become a prime target for large-scale phishing operations in 2025, according to new research from Hunt…
AI & ML Security Ransomware5 Min Read September 14, 2025 Beyond Buzzwords: The Real Impact of AI on Identity Security Artificial intelligence (AI) has become one of the most discussed technologies in recent years, often touted as the answer to many of…
Data Breach Phishing Ransomware4 Min Read September 13, 2025 A CISO’s Guide to Managing Cyber Risk in Healthcare Now more than ever before, our healthcare data is under attack. Of all of the sensitive information available on the dark web, medical records…
Android Apple Ransomware Web Security4 Min Read September 13, 2025 Why The Open Web Application Security Project (OWASP) Mobile Application Security (MAS) Project Is Critical The OWASP MAS project continues to lead the way in mobile application security. This article describes the resources and tools which have…
Linux Ransomware Vulnerabilities Windows2 Min Read September 13, 2025 Google Chrome Patches Critical Security Flaws in September 2025 Update In early September 2025, Google released an important security update for its Chrome browser—version 140.0.7339.127—to patch two…
Exploits Malware Ransomware Vulnerabilities2 Min Read September 13, 2025 HybridPetya: (Proof-of-concept?) ransomware can bypass UEFI Secure Boot ESET researchers have discovered HybridPetya, a bootkit-and-ransomware combo that’s a copycat of the infamous Petya/NotPetya malware,…
Malware Ransomware Vulnerabilities Windows2 Min Read September 13, 2025 New HybridPetya Weaponizing UEFI Vulnerability to Bypass Secure Boot on Outdated Systems In late July 2025, a series of ransomware samples surfaced on VirusTotal under filenames referencing the notorious Petya and NotPetya attacks.…
Malware Phishing Ransomware Vulnerabilities2 Min Read September 13, 2025 Microsoft Windows Defender Privilege Escalation Flaws It was an uneventful Patch Tuesday—until the headlines hit. Security feeds and vuln catalogs started buzzing: The Microsoft Windows…
Encryption Ransomware4 Min Read September 13, 2025 New HybridPetya Ransomware Bypasses UEFI Secure Boot With CVE-2024-7344 Exploit Cybersecurity researchers have discovered a new ransomware strain dubbed HybridPetya that resembles the notorious Petya/NotPetya malware,…
Linux Malware Ransomware Windows4 Min Read September 12, 2025 HybridPetya: More proof that Secure Boot bypasses are not just an urban legend A new ransomware strain dubbed HybridPetya was able to exploit a patched vulnerability to bypass Unified Extensible Firmware Interface (UEFI)…
Data Breach Ransomware3 Min Read September 12, 2025 ICO Warns of Student-Led Data Breaches in UK Schools Over half (57%) of insider data breaches in UK schools are caused by students, with many children being set up for “a life of cybercrime,” a…
DDoS Malware Ransomware Vulnerabilities1 Min Read September 12, 2025 Apple Issues New Spyware Alerts for French Officials and Journalists Ddos September 12, 2025 Apple occasionally issues spyware attack notifications, publicly disclosing on its website which countries or regions…
Data Breach DDoS Ransomware Vulnerabilities2 Min Read September 12, 2025 PyInstaller Flaw : Are Your Python Apps Vulnerable to Hijacking? Ddos September 12, 2025 The PyInstaller project has released fixes for a local privilege escalation vulnerability that affected applications…
Ascension Cyber Attack Cyber Attacks Cybersecurity FTC Ransomware Security Senator USA Vulnerability2 Min Read September 11, 2025 Senator Urges FTC Probe Into Microsoft After Ascension Ransomware Attack US Senator Ron Wyden urges the FTC to investigate Microsoft after its software contributed to a major ransomware attack on Ascension Hospital,…
Exploits Network Ransomware Vulnerabilities2 Min Read September 11, 2025 Akira ransomware exploiting critical SonicWall SSLVPN bug again The Akira ransomware gang is actively exploiting CVE-2024-40766, a year-old critical-severity access control vulnerability, to…
ICS/OT Network Ransomware Vulnerabilities0 Min Read September 11, 2025 CISA Launches Roadmap for the CVE Program In a new document, the US Cybersecurity and Infrastructure Security Agency (CISA) has confirmed its support for the Common Vulnerabilities and…
Malware Phishing Ransomware Windows3 Min Read September 11, 2025 12 Ways to Protect Your Business from Hackers During Remote Work Michelle MooreUniversity of San Diego’sSeptember 11, 2025 Remote work is here to stay, with nearly a quarter of the U.S. workforce (22%)…
Malware Ransomware Windows2 Min Read September 11, 2025 Wyden Urges FTC Investigation Over Ascension Ransomware Hack US Senator Ron Wyden of Oregon has called on the Federal Trade Commission to investigate Microsoft for cybersecurity lapses linked to…
Network Ransomware Vulnerabilities2 Min Read September 11, 2025 Akira ransomware affiliates continue breaching organizations via SonicWall firewalls Over a year after SonicWall patched CVE-2024-40766, a critical flaw in its next-gen firewalls, ransomware attackers are still gaining a…
Critical Infrastructure Ransomware4 Min Read September 11, 2025 Senator Wyden Urges FTC to Probe Microsoft for Ransomware-Linked Cybersecurity Negligence U.S. Senator Ron Wyden has called on the Federal Trade Commission (FTC) to probe Microsoft and hold it responsible for what he called "gross…
Exploits Ransomware4 Min Read September 11, 2025 Boost Operational Resilience: Proactive Security with CORA Best Practices On almost a monthly basis, the US Cybersecurity & Infrastructure Security Agency (CISA) publishes advisories about the latest…
Exploits Network Ransomware Vulnerabilities3 Min Read September 11, 2025 Australia Warns of Ransomware Attacks Exploiting SonicWall VPN Flaw CVE-2024-40766 The Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) has issued an urgent alert regarding active exploitation of…