Digital As Usual: Cyber Security – Quantifying cyber risk – Digital As Usual Cyber Security 2025
Browse by Chapter Click on the tiles below to see how security teams, board directors and broader business leaders are...
Read more →Browse by Chapter Click on the tiles below to see how security teams, board directors and broader business leaders are...
Read more →Attackers could hack smart solar systems and cause serious damages Pierluigi Paganini February 28, 2025 Hackers reveal security flaws in...
Read more →Browse by Chapter Click on the tiles below to see how security teams, board directors and broader business leaders are...
Read more →Skype will ring for the last time on May 5 as owner Microsoft retires the two-decade-old internet calling service that...
Read more →Microsoft exposes Storm-2139, a cybercrime network exploiting Azure AI via LLMjacking. Learn how stolen API keys enabled harmful content generation...
Read more →One of the most notorious providers of abuse-friendly “bulletproof” web hosting for cybercriminals has started routing its operations through networks...
Read more →The Qilin ransomware gang has claimed responsibility for the attack at Lee Enterprises that disrupted operations on February 3, leaking samples...
Read more →360XSS campaign exploits Krpano XSS to hijack search results & distribute spam ads on 350+ sites, including government, universities, and...
Read more →Law enforcement agencies from 19 countries have arrested 25 suspects linked to a criminal ring that was distributing child sexual...
Read more →Feb 28, 2025Ravie LakshmananMobile Security / Zero-Day A 23-year-old Serbian youth activist had their Android phone targeted by a zero-day...
Read more →France is proposing a law to require encrypted messaging applications including Signal and WhatsApp and encrypted email services such as...
Read more →Dive Brief: State and local communities are facing a rise in cyber threats from nation-state-linked and criminal threat groups, which...
Read more →