Jaguar Land Rover attack to cost UK £1.9bn, say cyber monitors
22
Oct
2025

Jaguar Land Rover attack to cost UK £1.9bn, say cyber monitors

Britain’s Cyber Monitoring Centre (CMC) – a non-profit dedicated to analysing and categorising cyber incidents in the UK – has…

AI security flaws afflict half of organizations
22
Oct
2025

AI security flaws afflict half of organizations

Listen to the article 3 min This audio is auto-generated. Please let us know if you have feedback. Dive Brief:…

Person typing on laptop
22
Oct
2025

FinWise data breach shows why encryption is your last defense

The 2024 FinWise data breach serves as a stark example of the growing insider threats faced by modern financial institutions….

Chinese Hackers Using ToolShell Vulnerability To Compromise Networks Of Government Agencies
22
Oct
2025

Chinese Hackers Using ToolShell Vulnerability To Compromise Networks Of Government Agencies

China-based threat actors have exploited the critical ToolShell vulnerability in Microsoft SharePoint servers to infiltrate networks across multiple continents, targeting…

Rival Hackers Dox Alleged Operators of Lumma Stealer
22
Oct
2025

Rival Hackers Dox Alleged Operators of Lumma Stealer – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More

A major gang that sells a secret data-stealing tool called Lumma Stealer, a highly adaptable Malware-as-a-Service (MaaS) marketed since 2022…

Local council devolution: Could it accelerate the pace of local government cloud adoption?
22
Oct
2025

Government faces questions about why US AWS outage disrupted UK tax office and banking firms

The UK government is being pressed for a response as to why a major, multi-hour Amazon Web Services (AWS) outage in…

Jaguar Land Rover extends production delay following cyberattack
22
Oct
2025

Jaguar Land Rover attack cost British economy $2.5 billion

The late summer cyberattack on Jaguar Land Rover led to a $2.5 billion (1.9 billion pound) financial hit on the…

Meta
22
Oct
2025

Meta launches new anti-scam tools for WhatsApp and Messenger

Meta has announced new tools to help WhatsApp and Messenger users protect themselves from potential scams and secure their accounts. On Messenger,…

Decoding Microsoft 365 Audit Log Events Using Bitfield Mapping Technique
22
Oct
2025

Decoding Microsoft 365 Audit Log Events Using Bitfield Mapping Technique

When users authenticate to Microsoft cloud services, their activities generate authentication events recorded across multiple logging systems. Microsoft Entra sign-in…

When Addressing Cyber Attacks in Healthcare, Prevention is Better Than Treatment
22
Oct
2025

When Addressing Cyber Attacks in Healthcare, Prevention is Better Than Treatment

No industry is spared from cyber-attacks. But some have greater consequences than others. When a hospital or medical group experiences…

Hackers Use ASP.NET Machine Keys to Break Into IIS, Push Malicious Extensions
22
Oct
2025

Hackers Use ASP.NET Machine Keys to Break Into IIS, Push Malicious Extensions

In September 2025, Texas A&M University System (TAMUS) Cybersecurity, a managed detection and response provider, in collaboration with Elastic Security…

More openness on the cards for Apple and Google’s mobile platforms
22
Oct
2025

More openness on the cards for Apple and Google’s mobile platforms

Following a nine-month investigation, the Competition and Markets Authority (CMA) has designated Google’s provision of its mobile platform with strategic…