Women In Cybersecurity Report, Winter 2025
The Women in Cybersecurity Report, a 12-minute video hosted by Cybercrime Magazine Deputy Editor Amanda Glassner, highlights the latest breakthroughs, voices, and stories from women leading the…
The Women in Cybersecurity Report, a 12-minute video hosted by Cybercrime Magazine Deputy Editor Amanda Glassner, highlights the latest breakthroughs, voices, and stories from women leading the…
A PDF named “NEW Purchase Order # 52177236.pdf” turned out to be a phishing lure. So we analyzed the phishing script behind it. A customer…
Singularity, a sophisticated Linux kernel rootkit designed for Linux kernel versions 6.x, has gained significant attention from the cybersecurity community for its advanced stealth mechanisms…
The threat actor known as Jewelbug has been increasingly focusing on government targets in Europe since July 2025, even as it continues to attack entities…
Askul data breach exposed over 700,000 records after ransomware attack Pierluigi Paganini December 17, 2025 Askul disclosed that an October RansomHouse ransomware attack compromised over…
Microsoft has asked businesses to reach out for advice on how to temporarily mitigate a known Message Queuing (MSMQ) issue causing enterprise apps and Internet Information Services (IIS) sites…
The group employs a custom ShadowPad IIS Listener module to transform compromised servers into a resilient, distributed relay network. This approach allows attackers to route…
A major privacy breach has surfaced involving the personal viewing histories of millions of people who once held Pornhub Premium accounts. The cybercriminal gang ShinyHunters…
Modern security teams often feel like they’re driving through fog with failing headlights. Threats accelerate, alerts multiply, and SOCs struggle to understand which dangers matter…
The UK’s technology sector has had, and continues to have, a significant demographic challenge. As the nation grapples with an ageing population, the UK government…
The Australian Taxation Office, Federal Police, the Energy Regulator and Veterans’ Affairs have all secured IT upgrade funding in the mid-year economic and fiscal outlook.…
CISA has officially added CVE-2025-59718 to its Known Exploited Vulnerabilities (KEV) catalog on December 16, 2025. Designating a critical deadline of December 23, 2025, for…