The Real Future of Tech · Joseph Thacker
In 2016, my friend Daniel Miessler wrote a book called “The Real Internet of Things.” It’s a quick little read that he later put on…
In 2016, my friend Daniel Miessler wrote a book called “The Real Internet of Things.” It’s a quick little read that he later put on…
Cybercriminals continue to use kernel-level malware as a preferred weapon against Windows systems amid a terrifying increase in cyberthreats. Operating at ring 0 the highest…
The International Criminal Court (ICC) recently announced it was hit by a sophisticated cyberattack. The attack, detected late last week, has been contained, and the…
nib Group has built a set of AI-powered workflows to support a complex data migration program following its acquisition of NDIS provider All Disability Plan…
Cybercriminals continue to use kernel-level malware as a preferred weapon against Windows systems amid a terrifying increase in cyberthreats. Operating at ring 0 the highest…
Telecom giant AT&T has agreed to a $177 million settlement to resolve two major lawsuits stemming from widespread data breaches that impacted millions of its…
Cyble threat intelligence researchers identified a phishing campaign aimed at Hungarian government targets that further investigation revealed was connected to wider global attack campaigns targeting…
New Batavia spyware targets Russian industrial enterprises Pierluigi Paganini July 07, 2025 Since March 2025, fake contract emails have been spreading Batavia spyware in targeted…
Hackers stole nearly $140 million from six banks in Brazil by using an employee’s credentials from C&M, a company that offers financial connectivity solutions. The incident reportedly…
Dr.Web Security Space for mobile devices reported that malware activity on Android devices increased significantly in the second quarter of 2025. Adware trojans, particularly from…
The makers of Call of Duty: World War 2 took the PC version of the game offline over the weekend amid widespread reports online that…
Malware analyst discovered a new version of the Atomic macOS info-stealer (also known as ‘AMOS’) that comes with a backdoor, to attackers persistent access to compromised…