Security1 Min Read August 28, 2025 Shadow IT Is Expanding Your Attack Surface. Here’s Proof Shadow IT – the systems your security team doesn’t know about – is a persistent challenge. Policies may ban them, but…
Security2 Min Read August 28, 2025 TransUnion suffers data breach impacting over 4.4 million people Update: Story updated with confirmation that this was another Salesforce data theft attack and the types of data stolen. Consumer credit…
Security2 Min Read August 28, 2025 IT system supplier cyberattack impacts 200 municipalities in Sweden A cyberattack on Miljödata, an IT systems supplier for roughly 80% of Sweden’s municipal systems, has caused accessibility problems…
Security3 Min Read August 28, 2025 Global Salt Typhoon hacking campaigns linked to Chinese tech firms The U.S. National Security Agency (NSA), the UK’s National Cyber Security Centre (NCSC), and partners from over a dozen countries have…
Security2 Min Read August 28, 2025 Over 28,000 Citrix devices vulnerable to new exploited RCE flaw More than 28,200 Citrix instances are vulnerable to a critical remote code execution vulnerability tracked as CVE-2025-7775 that is already…
Security2 Min Read August 28, 2025 Why zero trust is never 'done' and is an ever-evolving process Picture this scenario: Six months after celebrating their “zero trust transformation,” a financial services firm gets hit with a…
Healthcare Security2 Min Read August 28, 2025 Healthcare Services Group data breach impacts 624,000 people The Healthcare Services Group (HSGI) is alerting more than 600,000 individuals that their personal information was exposed in a security…
Security2 Min Read August 28, 2025 Google to verify all Android devs to protect users from malware Google is introducing a new defense for Android called ‘Developer Verification’ to block malware installations from…
Security3 Min Read August 28, 2025 Storm-0501 hackers shift to ransomware attacks in the cloud Microsoft warns that a threat actor tracked as Storm-0501 has evolved its operations, shifting away from encrypting devices with ransomware to…
Security2 Min Read August 28, 2025 Experimental PromptLock ransomware uses AI to encrypt, steal data Threat researchers discovered the first AI-powered ransomware, called PromptLock, that uses Lua scripts to steal and encrypt data on Windows,…
Security3 Min Read August 28, 2025 FreePBX servers hacked via zero-day, emergency fix released The Sangoma FreePBX Security Team is warning about an actively exploited FreePBX zero-day vulnerability that impacts systems with the…
Security2 Min Read August 27, 2025 Google to verify all Android devs to block malware on Google Play Google is introducing a new defense for Android called ‘Developer Verification’ to block malware installations from…
Security2 Min Read August 27, 2025 Citrix fixes critical NetScaler RCE flaw exploited in zero-day attacks Citrix fixed three NetScaler ADC and NetScaler Gateway flaws today, including a critical remote code execution flaw tracked as…
Security2 Min Read August 27, 2025 Silk Typhoon hackers hijack network captive portals in diplomat attacks State-sponsored hackers linked to the Silk Typhoon activity cluster targeted diplomats by hijacking web traffic to redirect to a…
Security3 Min Read August 27, 2025 Salesloft breached to steal OAuth tokens for Salesforce data-theft attacks Update: Story updated with further information. Hackers breached sales automation platform Salesloft to steal OAuth and refresh tokens from…
Security2 Min Read August 27, 2025 Nevada closes state offices as cyberattack disrupts IT systems Nevada remains two days into a cyberattack that began early Sunday, disrupting government websites, phone systems, and online platforms, and…
Security2 Min Read August 27, 2025 CISA warns of actively exploited Git code execution flaw The U.S. Cybersecurity & Infrastructure Security Agency (CISA) is warning of hackers exploiting an arbitrary code execution flaw in the…
Security1 Min Read August 27, 2025 Beyond GDPR security training: Turning regulation into opportunity By Eirik Salmi, System Analyst at Passwork Even though 88% of businesses spend over €1 million on GDPR compliance and 40% invest up to…
Security2 Min Read August 27, 2025 Nissan confirms design studio data breach claimed by Qilin ransomware Nissan Japan has confirmed to BleepingComputer that it suffered a data breach following unauthorized access to a server of one of its…
Security2 Min Read August 26, 2025 Surge in coordinated scans targets Microsoft RDP auth servers Internet intelligence firm GreyNoise reports that it has recorded a significant spike in scanning activity consisting of nearly 1,971 IP…
Artificial Intelligence Security2 Min Read August 26, 2025 New AI attack hides data-theft prompts in downscaled images Researchers have developed a novel attack that steals user data by injecting malicious prompts in images processed by AI systems before…
Security2 Min Read August 26, 2025 Farmers Insurance data breach impacts 1.1M people after Salesforce attack U.S. insurance giant Farmers Insurance has disclosed a data breach impacting 1.1 million customers, with BleepingComputer learning that the…
Security2 Min Read August 26, 2025 Auchan retailer data breach impacts hundreds of thousands of customers French retailer Auchan is informing that some sensitive data associated with loyalty accounts of several hundred thousand of its customers was…
Security3 Min Read August 26, 2025 Malicious Android apps with 19M installs removed from Google Play Seventy-seven malicious Android apps with more than 19 million installs were delivering multiple malware families to Google Play users.…
Security2 Min Read August 26, 2025 Critical Docker Desktop flaw lets attackers hijack Windows hosts A critical vulnerability in Docker Desktop for Windows and macOS allows compromising the host by running a malicious container, even if…
Security3 Min Read August 26, 2025 Defending against malware persistence techniques with Wazuh Malware persistence techniques enable attackers to maintain access to compromised endpoints despite system reboots, credential changes, or…
Security2 Min Read August 26, 2025 New Android malware poses as antivirus from Russian intelligence agency A new Android malware posing as an antivirus tool software created by Russia’s Federal Security Services agency (FSB) is being used to…
Legal Security2 Min Read August 26, 2025 FTC warns tech giants not to bow to foreign pressure on encryption The Federal Trade Commission (FTC) is warning major U.S. tech companies against yielding to foreign government demands that weaken data…
Security3 Min Read August 25, 2025 Murky Panda hackers exploit cloud trust to hack downstream customers A Chinese state-sponsored hacking group known as Murky Panda (Silk Typhoon) exploits trusted relationships in cloud environments to gain…
Security2 Min Read August 25, 2025 APT36 hackers abuse Linux .desktop files to install malware in new attacks The Pakistani APT36 cyberspies are using Linux .desktop files to load malware in new attacks against government and defense entities in India.…
Apple Security1 Min Read August 25, 2025 Fake Mac fixes trick users into installing new Shamos infostealer A new infostealer malware targeting Mac devices, called ‘Shamos,’ is targeting Mac devices in ClickFix attacks that impersonate…
Security2 Min Read August 25, 2025 Massive anti-cybercrime operation leads to over 1,200 arrests in Africa Law enforcement authorities in Africa have arrested over 1,200 suspects as part of ‘Operation Serengeti 2.0,’ an INTERPOL-led…
Healthcare Security3 Min Read August 25, 2025 DaVita says ransomware gang stole data of nearly 2.7 million people Kidney dialysis firm DaVita has confirmed that a ransomware gang that breached its network stole the personal and health information of nearly…
Legal Security2 Min Read August 25, 2025 Dev gets 4 years for creating kill switch on ex-employer's systems A software developer has been sentenced to four years in prison for sabotaging his ex-employer’s Windows network with custom malware and…
Security2 Min Read August 25, 2025 Colt confirms customer data stolen as Warlock ransomware auctions files UK-based telecommunications company Colt Technology Services confirms that customer documentation was stolen as Warlock ransomware gang…
Security3 Min Read August 25, 2025 Europol confirms $50,000 Qilin ransomware reward is fake Europol has confirmed that a Telegram channel impersonating the agency and offering a $50,000 reward for information on two Qilin ransomware…
Security1 Min Read August 25, 2025 Why Certified VMware Pros Are Driving the Future of IT By Brenda Emerson, VMUG President IT isn’t getting any simpler. For many, the cloud’s gone hybrid, AI’s moved in…
Security1 Min Read August 25, 2025 FBI warns of Russian hackers exploiting 7-year-old Cisco flaw The Federal Bureau of Investigation (FBI) has warned that hackers linked to Russia’s Federal Security Service (FSB) are targeting…