Kettering Health
21
May
2025

Kettering Health hit by system-wide outage after ransomware attack

Kettering Health, a healthcare network that operates 14 medical centers in Ohio, was forced to cancel inpatient and outpatient procedures…

SideWinder APT Hackers Exploits Legacy Office Vulnerabilities to Deploy Malware Undetected
21
May
2025

SideWinder APT Hackers Exploits Legacy Office Vulnerabilities to Deploy Malware Undetected

The Acronis Threat Research Unit (TRU) has revealed an advanced campaign believed to be orchestrated by the SideWinder advanced persistent…

AI Prompt Injection Attacks
21
May
2025

Google DeepMind Unveils Defense Against Indirect Prompt Injection Attacks

Google DeepMind has developed an ongoing process to counter the continuously evolving threat from Agentic AI’s bete noir: adaptive indirect…

A house full of open windows: Why telecoms may never purge their networks of Salt Typhoon
21
May
2025

A house full of open windows: Why telecoms may never purge their networks of Salt Typhoon

When the news broke that a Chinese hacking group known as Salt Typhoon had penetrated multiple U.S. telecommunications networks, gained…

Cellcom Confirms Cybersecurity Breach After Network Failure
21
May
2025

Cellcom Confirms Cybersecurity Breach After Network Failure

Cellcom/Nsight has officially confirmed a cyberattack as the cause of a five-day service disruption affecting customers across its network. In…

How to Detect Phishing Attacks Faster: Tycoon2FA Example
21
May
2025

How to Detect Phishing Attacks Faster: Tycoon2FA Example

It takes just one email to compromise an entire system. A single well-crafted message can bypass filters, trick employees, and…

PowerSchool hacker pleads guilty
21
May
2025

US Student to Plead Guilty Over PowerSchool Hack

A Massachusetts student pleaded guilty in court to hacking two US companies and extorting them for ransom. One of the…

U.S. CISA adds Ivanti EPMM, MDaemon Email Server, Srimax Output Messenger, Zimbra Collaboration, and ZKTeco BioTime flaws to its Known Exploited Vulnerabilities catalog
21
May
2025

U.S. CISA adds Ivanti EPMM, MDaemon Email Server, Srimax Output Messenger, Zimbra Collaboration, and ZKTeco BioTime flaws to its Known Exploited Vulnerabilities catalog

U.S. CISA adds Ivanti EPMM, MDaemon Email Server, Srimax Output Messenger, Zimbra Collaboration, and ZKTeco BioTime flaws to its Known…

How China’s military might use anti-AI tactics on the battlefields of the future
21
May
2025

How China’s military might use anti-AI tactics on the battlefields of the future

China’s armed forces must find ways to undermine the data and computing capacity of its adversaries as AI gains an…

Marks & Spencer
21
May
2025

Marks & Spencer faces $402 million profit hit after cyberattack

British retailer giant Marks & Spencer (M&S) is bracing for a potential profit hit of up to £300 million £300…

3 Teens Almost Got Away With Murder. Then Police Found Their Google Searches
21
May
2025

3 Teens Almost Got Away With Murder. Then Police Found Their Google Searches

Not everyone is so cautious. Baker and Sandoval regularly field calls from police across the country asking for a copy…

LockBit Internal Data Leak Reveals Payload Creation Methods and Ransom Demands
21
May
2025

LockBit Internal Data Leak Reveals Payload Creation Methods and Ransom Demands

The notorious ransomware group LockBit inadvertently suffered a major data breach, exposing the inner workings of their ransomware-as-a-service (RaaS) operations….