The MSP Customer Insight Report 2025
16
Jul
2025

The MSP Customer Insight Report 2025

The MSP Customer Insight Report 2025 reveals organisations are now relying on MSPs and channel partners not just for technical…

Hacktivist Groups Attacks on Critical ICS Systems to Steal Sensitive Data
16
Jul
2025

Hacktivist Groups Attacks on Critical ICS Systems to Steal Sensitive Data

The cybersecurity landscape has witnessed an alarming evolution in hacktivist operations, with threat actors increasingly shifting their focus from traditional…

Google's Big Sleep security AI agent foils bug exploitation
16
Jul
2025

Google’s Big Sleep security AI agent foils bug exploitation

Google has used a security-specific AI agent to detect a second critical vulnerability that was on the radar of threat…

Cybersecurity Risks of Portable Storage Media in OT Environments
16
Jul
2025

Cybersecurity Risks of Portable Storage Media in OT Environments

The NIST National Cybersecurity Center of Excellence has developed the draft NIST Special Publication (SP) 1334, Reducing the Cybersecurity Risks of Portable…

U.S. CISA adds Citrix NetScaler ADC and Gateway flaw to its Known Exploited Vulnerabilities catalog
16
Jul
2025

U.S. CISA adds Wing FTP Server flaw to its Known Exploited Vulnerabilities catalog

U.S. CISA adds Wing FTP Server flaw to its Known Exploited Vulnerabilities catalog Pierluigi Paganini July 16, 2025 U.S. Cybersecurity and…

Former Army soldier pleads guilty to widespread attack spree linked to AT&T, Snowflake and others
16
Jul
2025

Former Army soldier pleads guilty to widespread attack spree linked to AT&T, Snowflake and others

A 21-year-old former Army soldier pleaded guilty Tuesday to charges stemming from a series of attacks and extortion attempts last…

North Korean Hackers Using Fake Zoom Invites to Attack Crypto Startups
16
Jul
2025

North Korean Hackers Using Fake Zoom Invites to Attack Crypto Startups

North Korean threat actors have escalated their sophisticated cyber operations against cryptocurrency startups, deploying an evolved malware campaign that leverages…

Fake Telegram Apps Spread via 607 Domains in Large-Scale Android Malware Campaign
16
Jul
2025

Fake Telegram Apps Spread via 607 Domains in New Android Malware Attack

A new threat campaign is tricking Android users into downloading fake Telegram apps from hundreds of malicious domains, according to…

Hungry Jack's stands up Workday for its 30,000 people
16
Jul
2025

Hungry Jack’s stands up Workday for its 30,000 people

Hungry Jack’s is standing up its first integrated HR system on Workday in four phases to better support its people…

Abacus dark web drug market goes offline in suspected exit scam
16
Jul
2025

Abacus dark web drug market goes offline in suspected exit scam

Abacus Market, the largest Western darknet marketplace supporting Bitcoin payments, has shut down its public infrastructure in a move suspected…

Ransomware Gangs Actively Expanding to Attack VMware and Linux Systems
16
Jul
2025

Ransomware Gangs Actively Expanding to Attack VMware and Linux Systems

The cybersecurity landscape has experienced a dramatic shift as ransomware operators increasingly target Linux and VMware environments, abandoning their traditional…

Woodside Energy builds an industrial data fabric
15
Jul
2025

Woodside Energy builds an industrial data fabric

Woodside Energy has stood up a data fabric to streamline the collection and transmission of data from its assets and…