Victoria’s Secret postponing release of report earnings amid breach impact
03
Jun
2025

Victoria’s Secret postponing release of report earnings amid breach impact

Victoria’s Secret said Tuesday that it is postponing the release of its fiscal first quarter earnings report as a previously…

CISA warns of ConnectWise ScreenConnect bug exploited in attacks
03
Jun
2025

CISA warns of ConnectWise ScreenConnect bug exploited in attacks

CISA is alerting federal agencies in the U.S. of hackers exploiting a recently patched ScreenConnect vulnerability that could lead to…

What Is Cyber Threat Intelligence: Quick Guide For CISOs 
03
Jun
2025

What Is Cyber Threat Intelligence: Quick Guide For CISOs 

Cyber threat intelligence (CTI) is the practice of collecting, analyzing, and transforming data about cyber threats into actionable insights to…

Russian Hacker Black Owl Targets Critical Industries to Steal Financial Data
03
Jun
2025

Russian Hacker Black Owl Targets Critical Industries to Steal Financial Data

A pro-Ukrainian hacktivist group known as BO Team, also operating under aliases such as Black Owl, Lifting Zmiy, and Hoody…

Multi-Stage PowerShell Attack
03
Jun
2025

Fake DocuSign, Gitcode Sites Spread NetSupport RAT via Multi-Stage PowerShell Attack

Jun 03, 2025Ravie LakshmananUnited States Threat hunters are alerting to a new campaign that employs deceptive websites to trick unsuspecting…

People on the move in cybersecurity
03
Jun
2025

Mikko Hypponen Leaves Anti-Malware Industry to Fight Against Drones

Industry veteran Mikko Hypponen has joined the Finnish anti-drone company Sensofusion as Chief Research Officer (CRO) after more than three…

Firefox
03
Jun
2025

Mozilla launches new system to detect Firefox crypto drainer add-ons

Mozilla has developed a new security feature for its add-on portal that helps block Firefox malicious extensions that drain cryptocurrency…

Aembit Expands Workload IAM to Microsoft Ecosystem, Enhancing Hybrid Security for Non-Human Identities
03
Jun
2025

Aembit Expands Workload IAM to Microsoft Ecosystem, Enhancing Hybrid Security for Non-Human Identities

Aembit, the workload identity and access management (IAM) company, today announced a major expansion of its platform to support Microsoft…

Top Russian Dark Web Market Tools Drive Surge in Credential Theft Attacks
03
Jun
2025

Top Russian Dark Web Market Tools Drive Surge in Credential Theft Attacks

In a chilling revelation for cybersecurity professionals, the Russian Market has solidified its position as the leading hub for stolen…

Roundcube Webmail Bug
03
Jun
2025

Critical 10-Year-Old Roundcube Webmail Bug Allows Authenticated Users Run Malicious Code

Jun 03, 2025Ravie LakshmananEmail Security / Vulnerability Cybersecurity researchers have disclosed details of a critical security flaw in the Roundcube…

Why Scamming Can't Be Stopped—But It Can Be Managed
03
Jun
2025

Why Scamming Can’t Be Stopped—But It Can Be Managed

Scams are no longer annoyances, tricking individuals but not damaging the economy. They have become big business, with Arkose Labs…

Android banking trojan Crocodilus rapidly evolves and goes global
03
Jun
2025

Android banking trojan Crocodilus rapidly evolves and goes global

Android banking trojan Crocodilus rapidly evolves and goes global Pierluigi Paganini June 03, 2025 A new Android banking trojan called…