AI security: Balancing innovation with protection
02
Jun
2025

AI security: Balancing innovation with protection

Remember the scramble for USB blockers because staff kept plugging in mysterious flash drives? Or the sudden surge in blocking…

Trump chief of staff Susie Wiles impersonated
02
Jun
2025

US Government Is Investigating Messages Impersonating Trump’s Chief of Staff, Susie Wiles

The government is investigating after elected officials, business executives and other prominent figures in recent weeks received messages from someone…

Qualcomm
02
Jun
2025

Qualcomm fixes three Adreno GPU zero-days exploited in attacks

Qualcomm has released security patches for three zero-day vulnerabilities in the Adreno Graphics Processing Unit (GPU) driver that impact dozens…

New Study Uncovers Vulnerable Code Pattern Exposes GitHub Projects To Path Traversal Attacks
02
Jun
2025

New Study Uncovers Vulnerable Code Pattern Exposes GitHub Projects To Path Traversal Attacks

A comprehensive security research study has revealed a widespread vulnerable code pattern affecting thousands of open-source projects on GitHub, exposing…

Haozi’s Plug-and-Play Phishing Attack Steals Over $280,000 from Users
02
Jun
2025

Haozi’s Plug-and-Play Phishing Attack Steals Over $280,000 from Users

Netcraft security researchers have identified a significant resurgence of the Chinese-language Haozi Phishing-as-a-Service (PhaaS) operation, distinguished by its cartoon mouse…

The Secret Defense Strategy of Four Critical Industries Combating Advanced Cyber Threats
02
Jun
2025

The Secret Defense Strategy of Four Critical Industries Combating Advanced Cyber Threats

The evolution of cyber threats has forced organizations across all industries to rethink their security strategies. As attackers become more…

AI should be used to improve boardroom efficiency
02
Jun
2025

AI should be used to improve boardroom efficiency

Members of the board in businesses are missing out on the potential to ensure artificial intelligence (AI) manages the regulatory…

Chrome
02
Jun
2025

Chrome to Distrust Chunghwa Telecom and Netlock Certificates

Google on Friday announced that the Chrome Root Store will no longer trust digital certificates issued by Chunghwa Telecom and…

Role of Threat Intelligence in Proactive Defense Strategies
02
Jun
2025

Role of Threat Intelligence in Proactive Defense Strategies

Organizations worldwide increasingly recognize that traditional reactive cybersecurity approaches are no longer sufficient to combat sophisticated cyber threats. A comprehensive…

CISO Roles Take on Strategic Security Leadership Roles Beyond Cybersecurity as Organizations
02
Jun
2025

CISO Roles Take on Strategic Security Leadership Roles Beyond Cybersecurity as Organizations

A comprehensive analysis of over 800 Chief Information Security Officers reveals a fundamental transformation in the cybersecurity leadership landscape, with…

Hacker unmasked
02
Jun
2025

Alleged Conti, TrickBot Gang Leader Unmasked

German authorities have named Russian national Vitaly Nikolaevich Kovalev as the founder and leader of the TrickBot cybercrime gang. Established…

Hackers Weaponized Free SSH Client Putty to Attack Windows Systems With Malware
02
Jun
2025

Hackers Weaponized Free SSH Client Putty to Attack Windows Systems With Malware

A sophisticated malware campaign that exploits legitimate SSH clients, including both the popular PuTTY application and Windows’ built-in OpenSSH implementation,…