The financial industry is transforming as artificial intelligence (AI) is becoming an integral tool for managing operations, improving decision-making, and…
A widespread exploitation campaign is targeting WordPress websites with GutenKit and Hunk Companion plugins vulnerable to critical-severity, old security issues…
As the festive season approaches, organizations are witnessing a disturbing increase in targeted attacks on digital gift card systems. The…
U.S. CISA adds Microsoft WSUS, and Adobe Commerce and Magento Open Source flaws to its Known Exploited Vulnerabilities catalog Pierluigi Paganini…
Oct 24, 2025Ravie LakshmananData Breach / Cybercrime The threat actors behind a large-scale, ongoing smishing campaign have been attributed to…
More than 3,000 malicious YouTube videos were used to distribute infostealer malware, according to a new report detailing the operation….
The cybersecurity landscape experienced a significant shift in July 2025 when threat actors associated with Warlock ransomware began exploiting a…
A sophisticated Python-based remote access trojan has emerged in the gaming community, disguising itself as a legitimate Minecraft client to…
A listing on the dark web data leak site run by the Everest ransomware group claims it holds 576,686 personal…
The UK government has released new anti-ransomware guidance designed to address the weaknesses in supply chains that have been the…
Ransomware attacks have soared 50% in 2025 despite major changes among the leading ransomware groups, according to a new Cyble…
The proliferation of autonomous systems and tools is changing the risk management landscape for financial services companies, according to technology…











