The role of the CISO in cybersecurity maturity
In 2024, the number of cyberattacks worldwide increased by a staggering 44%, and this is expected to continue to grow through 2025. Despite this significant…
In 2024, the number of cyberattacks worldwide increased by a staggering 44%, and this is expected to continue to grow through 2025. Despite this significant…
SK Telecom says that a recently disclosed cybersecurity incident in April, first occurred all the way back in 2022, ultimately exposing the USIM data of 27…
Datadog Security Research has uncovered a formidable new cryptojacking campaign dubbed “RedisRaider,” specifically targeting Linux servers with publicly accessible Redis instances. This sophisticated Linux worm…
May 20, 2025Ravie LakshmananMalware / Cloud Security A threat actor known as Hazy Hawk has been observed hijacking abandoned cloud resources of high-profile organizations, including…
Peter Green Chilled, a major distributor of chilled and fresh products to British supermarkets, has reportedly fallen victim to a ransomware attack orchestrated by an…
Researchers from the U.S. National Institute of Standards and Technology (NIST) and the Cybersecurity and Infrastructure Security Agency (CISA) have developed a new security metric…
A Chinese government-backed intelligence operation is actively using fake employment sites and social media to recruit laid-off federal workers, according to a report released Monday…
A threat actor tracked as ‘Hazy Hawk’ is hijacking forgotten DNS CNAME records pointing to abandoned cloud services, taking over trusted subdomains of governments, universities, and…
Cybersecurity researchers have uncovered a sophisticated malware campaign orchestrated by the notorious Kimsuky Advanced Persistent Threat (APT) group, deploying intricately crafted PowerShell payloads to deliver…
In a troubling development, a new victim of ransomware has emerged today, targeting a key food distributor that supplies refrigerated goods and groceries to major…
The cyber security team at Broadcom has acknowledged that during the Pwn2Own hacking contest in Berlin in March, there were three successful attacks on the…
Listen to the article 4 min This audio is auto-generated. Please let us know if you have feedback. Dive Brief: Major tech and cybersecurity companies…