Details emerge on BlackSuit ransomware takedown
04
Aug
2025

Details emerge on BlackSuit ransomware takedown

BlackSuit’s technical infrastructure was seized in a globally coordinated takedown operation last month that authorities touted as a significant blow…

Threat Actors Using AI to Scale Operations, Accelerate Attacks and Attack Autonomous AI Agents
04
Aug
2025

Threat Actors Using AI to Scale Operations, Accelerate Attacks and Attack Autonomous AI Agents

The cybersecurity landscape has witnessed an unprecedented evolution as threat actors increasingly weaponize artificial intelligence to amplify their attack capabilities…

Neural Hijacking: Is Your Brain Making Security Decisions Without You?
04
Aug
2025

Neural Hijacking: Is Your Brain Making Security Decisions Without You?

Introduction: The Battlefield Inside Your Head In cybersecurity, we master firewalls and encryption. But are we neglecting the most critical…

Black Hat USA: Halcyon and Sophos tag-team ransomware fightback
04
Aug
2025

Black Hat USA: Halcyon and Sophos tag-team ransomware fightback

Cyber protection specialists Halcyon and Sophos have teamed up to develop a new threat intelligence sharing joint venture that will…

Hacking group D4rk4rmy claimed the hack of Monte-Carlo Société des Bains de Mer
04
Aug
2025

Hacking group D4rk4rmy claimed the hack of Monte-Carlo Société des Bains de Mer

Hacking group D4rk4rmy claimed the hack of Monte-Carlo Société des Bains de Mer Pierluigi Paganini August 04, 2025 The cybercrime…

Microsoft 365
04
Aug
2025

Outdated Office apps lose access to voice features in January

Microsoft announced that the transcription, dictation, and read aloud features will stop working in older versions of Office 365 applications…

New Python-Based PXA Stealer Via Telegram Stolen 200,000 Unique Passwords and Hundreds of Credit Cards
04
Aug
2025

New Python-Based PXA Stealer Via Telegram Stolen 200,000 Unique Passwords and Hundreds of Credit Cards

A sophisticated new cybercriminal campaign has emerged, leveraging a Python-based information stealer known as PXA Stealer to orchestrate one of…

NVIDIA Triton Bugs Let Unauthenticated Attackers Execute Code and Hijack AI Servers
04
Aug
2025

NVIDIA Triton Bugs Let Unauthenticated Attackers Execute Code and Hijack AI Servers

Aug 04, 2025Ravie LakshmananAI Security / Vulnerability A newly disclosed set of security flaws in NVIDIA’s Triton Inference Server for…

Agentic AI a target-rich zone for cyber attackers in 2025
04
Aug
2025

Agentic AI a target-rich zone for cyber attackers in 2025

Cyber criminals and nation-states hostile to Western countries are weaponising artificial intelligence (AI) with gusto to carry out attacks and…

Kelly Benefits December data breach impacted over 400,000 individuals
04
Aug
2025

Northwest Radiologists data breach hits 350,000 in Washington

Northwest Radiologists data breach hits 350,000 in Washington Pierluigi Paganini August 04, 2025 A January 2025 breach at Northwest Radiologists…

Hackers Use AI to Create Malicious NPM Package that Drains Your Crypto Wallet
04
Aug
2025

Hackers Use AI to Create Malicious NPM Package that Drains Your Crypto Wallet

Cybercriminals have escalated their attack sophistication by leveraging artificial intelligence to create a malicious NPM package that masquerades as a…

New JSCEAL Malware Targets Millions via Fake Crypto App Ads
04
Aug
2025

New JSCEAL Malware Targets Millions via Fake Crypto App Ads

A new cybercrime campaign, dubbed JSCEAL, is actively targeting people who use cryptocurrency apps, reveals the latest research from security…