Pro-Russia hacktivists launching attacks that could damage OT
Listen to the article 6 min This audio is auto-generated. Please let us know if you have feedback. Hacktivist groups supporting the Russian government are…
Listen to the article 6 min This audio is auto-generated. Please let us know if you have feedback. Hacktivist groups supporting the Russian government are…
Is your organization’s senior leadership vulnerable to a cyber-harpooning? Learn how to keep them safe. 09 Dec 2025 • , 5 min. read When a…
A new phishing kit called Spiderman is targeting customers of numerous European banks and cryptocurrency services using pixel-perfect replicas of legitimate sites. The platform allows…
Black Duck today announced the launch of Black Duck Signal, a new agentic AI platform designed to secure software at the same speed it’s now…
For the past few months, the House Oversight and Government Reform Committee has engaged in a sprawling and extremely public investigation of disgraced financier and…
The cybersecurity landscape has reached a troubling inflection point. On December 5, 2025, Huntress identified a sophisticated campaign deploying the Atomic macOS Stealer (AMOS) through…
Analyst IDC has reported that the IT market grew 14%, which represents the largest increase in almost 30 years. According to IDC, the emergence of…
The Justice Department has charged a Ukrainian national with conducting cyberattacks on critical infrastructure worldwide as part of two Russian state-sponsored hacking operations that targeted…
For all the scary talk about cyberattacks from vendors and industry experts, relatively few attacks are actually devastating. But the Jaguar Land Rover (JLR) attack…
Cybersecurity is about to hit a turning point in 2026. Attackers aren’t only testing AI but also building campaigns around it. Their tooling is getting…
Parrot Security OS has unveiled its highly anticipated 7.0 beta release, marking a significant milestone with the integration of Debian 13 and a complete desktop…
Dec 10, 2025Ravie LakshmananHardware Security / Vulnerability Three security vulnerabilities have been disclosed in the Peripheral Component Interconnect Express (PCIe) Integrity and Data Encryption (IDE)…