A Researcher Figured Out How to Reveal Any Phone Number Linked to a Google Account
09
Jun
2025

A Researcher Figured Out How to Reveal Any Phone Number Linked to a Google Account

A cybersecurity researcher was able to figure out the phone number linked to any Google account, information that is usually…

New Blitz Malware Targets Windows Servers to Deploy Monero Miner
09
Jun
2025

New Blitz Malware Targets Windows Servers to Deploy Monero Miner

A new Windows-based malware named Blitz has been identified in 2024, with an updated version detected in early 2025. This…

Are we normalising surveillance in schools?
09
Jun
2025

Are we normalising surveillance in schools?

A vast array of student information is collected under protective measures in secondary schools and colleges, yet the pupils are…

UNFI
09
Jun
2025

Grocery wholesale giant United Natural Foods hit by cyberattack

United Natural Foods (UNFI), North America’s largest publicly traded wholesale distributor, was forced to shut down some systems following a…

Seraphic Security Unveils BrowserTotal™ - Free AI-Powered Browser Security Assessment For Enterprises
09
Jun
2025

Seraphic Security Unveils BrowserTotal – Free AI-Powered Browser Security Assessment For Enterprises

Tel Aviv, Israel, June 9th, 2025, CyberNewsWire Available to the public and debuting at the Gartner Security & Risk Management…

Hackers Deploy FormBook Malware via Weaponized Excel Files to Target Windows Systems
09
Jun
2025

Hackers Deploy FormBook Malware via Weaponized Excel Files to Target Windows Systems

A critical phishing campaign targeting Windows users has been uncovered by FortiGuard Labs, leveraging malicious Excel attachments to exploit a…

Data security is a CX issue, too
09
Jun
2025

Data security is a CX issue, too

Listen to the article 3 min This audio is auto-generated. Please let us know if you have feedback. Adidas informed…

Hackers Actively Exploiting Fortigate Vulnerabilities to Deploy Qilin Ransomware
09
Jun
2025

Hackers Actively Exploiting Fortigate Vulnerabilities to Deploy Qilin Ransomware

A new wave of cyberattacks has emerged targeting critical infrastructure through the exploitation of Fortigate security appliance vulnerabilities, with threat…

Kettering Health Confirms Interlock Ransomware Breach and Data Theft
09
Jun
2025

Kettering Health Confirms Interlock Ransomware Breach and Data Theft

On the morning of May 20, 2025, Kettering Health, a major Ohio-based healthcare provider operating 14 medical centers and over…

How to Keep Your Litecoin Safe: A Practical Guide
09
Jun
2025

How to Spot, Avoid, and Recover from Crypto Scams

It seems not a day goes by without news of another crypto scam targeting unsuspecting holders. Those owning popular cryptocurrencies…

Five Business Continuity And Disaster Recovery Strategies For Ransomware Defense
09
Jun
2025

The Greatest Internet Pioneer You’ve Never Heard Of

After watching the documentary “We Live in Public,” a hyperventilated account of the rise and weird fall of the dot-com…

Roundcube RCE: Dark web activity signals imminent attacks (CVE-2025-49113)
09
Jun
2025

Roundcube RCE: Dark web activity signals imminent attacks (CVE-2025-49113)

With an exploit for a critical Roundcube vulnerability (CVE-2025-49113) being offered for sale on underground forums and a PoC exploit…