Vic gov to spend $100m on cyber security
The Victorian government will spend $100 million strengthening cyber security across government agencies as one of the topline technology-related measures in the state budget. About…
The Victorian government will spend $100 million strengthening cyber security across government agencies as one of the topline technology-related measures in the state budget. About…
Listen to the article 4 min This audio is auto-generated. Please let us know if you have feedback. The No. 2 official in the Cybersecurity…
The VanHelsing ransomware-as-a-service operation published the source code for its affiliate panel, data leak blog, and Windows encryptor builder after an old developer tried to sell…
A newly identified cyberattack campaign has revealed the persistent and evolving threat of Bumblebee malware, a sophisticated downloader first discovered in 2022 and linked to…
4G Calling (VoLTE) flaw allowed to locate any O2 customer with a phone call Pierluigi Paganini May 20, 2025 A flaw in O2 4G Calling…
The following is a guest post from Pam Lindemoen, chief security officer for the Retail & Hospitality Information Sharing and Analysis Center. Opinions are the…
Russian organizations have become prime targets of a sophisticated malware campaign deploying the Pure malware family, first identified in mid-2022. Distributed via a Malware-as-a-Service (MaaS)…
Biotechnology giant Regeneron Pharmaceuticals has emerged as the successful bidder in the bankruptcy auction for genetic testing pioneer 23andMe, offering $256 million for the majority…
In 2024, the number of cyberattacks worldwide increased by a staggering 44%, and this is expected to continue to grow through 2025. Despite this significant…
SK Telecom says that a recently disclosed cybersecurity incident in April, first occurred all the way back in 2022, ultimately exposing the USIM data of 27…
Datadog Security Research has uncovered a formidable new cryptojacking campaign dubbed “RedisRaider,” specifically targeting Linux servers with publicly accessible Redis instances. This sophisticated Linux worm…
May 20, 2025Ravie LakshmananMalware / Cloud Security A threat actor known as Hazy Hawk has been observed hijacking abandoned cloud resources of high-profile organizations, including…