Arsen Launches AI-Powered Vishing Simulation to Help Organizations Combat Voice Phishing at Scale
13
Jun
2025

Arsen Launches AI-Powered Vishing Simulation to Help Organizations Combat Voice Phishing at Scale

Paris, France, June 13th, 2025, CyberNewsWire Arsen, the cybersecurity startup known for defending organizations against social engineering threats, has announced…

Windows
13
Jun
2025

KB5060533 update triggers boot errors on Surface Hub v1 devices

Microsoft is investigating a known issue that triggers Secure Boot errors and prevents Surface Hub v1 devices from starting up….

Predator Mobile Spyware Remains Consistent with New Design Changes to Evade Detection
13
Jun
2025

Predator Mobile Spyware Remains Consistent with New Design Changes to Evade Detection

Despite sustained international pressure, sanctions, and public exposures over the past two years, the sophisticated Predator mobile spyware has demonstrated…

NIST Releases New Guide - 19 Strategies for Building Zero Trust Architectures
13
Jun
2025

NIST Releases New Guide – 19 Strategies for Building Zero Trust Architectures

The National Institute of Standards and Technology (NIST) has released groundbreaking guidance to help organizations implement Zero Trust Architectures (ZTAs)…

YouTube Marketing Lesson From RSA Conference 2025
13
Jun
2025

Tales From Leading Women in Cybersecurity

The Black Hat USA 2025 two-day main conference on Aug. 6 and 7 will feature more than 100 selected Briefings. Some of the…

Microsoft 365
13
Jun
2025

Microsoft confirms auth issues affecting Microsoft 365 users

Microsoft is investigating an ongoing incident that is causing users to experience errors with some Microsoft 365 authentication features. As…

New SmartAttack Steals Sensitive Data From Air-Gapped Systems via Smartwatches
13
Jun
2025

New SmartAttack Steals Sensitive Data From Air-Gapped Systems via Smartwatches

A sophisticated new attack method called “SmartAttack” that can breach supposedly secure air-gapped computer systems using smartwatches as covert data…

Amazon Cloud Cam Flaw Allows Attackers to Intercept and Modify Network Traffic
13
Jun
2025

Amazon Cloud Cam Flaw Allows Attackers to Intercept and Modify Network Traffic

A critical vulnerability (CVE-2025-6031) has been identified in Amazon Cloud Cam devices, which reached end-of-life (EOL) status in December 2022….

iOS zero-click attacks used to deliver Graphite spyware (CVE-2025-43200)
13
Jun
2025

iOS zero-click attacks used to deliver Graphite spyware (CVE-2025-43200)

A zero-click attack leveraging a freshly disclosed Messages vulnerability (CVE-2025-43200) has infected the iPhones of two European journalists with Paragon’s…

Monitoring Alerts to Measuring Risk
13
Jun
2025

Shifting from Monitoring Alerts to Measuring Risk

Introduction: Security at a Tipping Point Security Operations Centers (SOCs) were built for a different era, one defined by perimeter-based…

Victoria’s Secret
13
Jun
2025

Victoria’s Secret restores critical systems after cyberattack

Victoria’s Secret has restored all critical systems impacted by a May 24 security incident that forced it to shut down…

New GitHub Device Code Phishing Attacks Targeting Developers to Steal Tokens
13
Jun
2025

New GitHub Device Code Phishing Attacks Targeting Developers to Steal Tokens

Cybersecurity researchers have identified a sophisticated new phishing campaign that exploits GitHub’s OAuth2 device authorization flow to compromise developer accounts…