Hacker starting at a smartphone
23
Jun
2025

Malware on Google Play, Apple App Store stole your photos—and crypto

A new mobile crypto-stealing malware called SparkKitty was found in apps on Google Play and the Apple App Store, targeting…

Speaker Proposal Deadline Approaches for OpenSSL Conference 2025 in Prague
23
Jun
2025

Speaker Proposal Deadline Approaches for OpenSSL Conference 2025 in Prague

The OpenSSL Corporation and the OpenSSL Foundation are issuing a final call for speaker proposals for the inaugural OpenSSL Conference 2025, taking place October 7–9, 2025, at the Vienna…

Microsoft Enhances Defender for Office 365 with Detailed Spam and Phishing Analysis
23
Jun
2025

Microsoft Enhances Defender for Office 365 with Detailed Spam and Phishing Analysis

Microsoft has announced a significant upgrade to its Defender for Office 365 platform, introducing a new AI-powered capability designed to…

McLaren Health Care Data Breach Exposes 743,000 People Personal Information
23
Jun
2025

McLaren Health Care Data Breach Exposes 743,000 People Personal Information

McLaren Health Care, a major healthcare organization based in Grand Blanc, Michigan, has disclosed a significant data breach that compromised…

NCSC Issues Alert on 'UMBRELLA STAND' Malware Targeting Fortinet FortiGate Firewalls
23
Jun
2025

NCSC Issues Alert on ‘UMBRELLA STAND’ Malware Targeting Fortinet FortiGate Firewalls

The National Cyber Security Centre (NCSC) has sounded the alarm over a newly identified malware dubbed “UMBRELLA STAND,” specifically targeting…

The internet’s hidden gatekeeper is a ‘must have’, not an optional extra
23
Jun
2025

The internet’s hidden gatekeeper is a ‘must have’, not an optional extra

In an era where cyber threats lurk behind every click, businesses and individuals are fighting an invisible enemy that exploits…

Hands-on Cybersecurity Threat Hunting Guide for SOC Analysts and MSSPs
23
Jun
2025

Hands-on Cybersecurity Threat Hunting Guide for SOC Analysts and MSSPs

This comprehensive guide provides SOC analysts and MSSP teams with practical threat hunting techniques using advanced threat intelligence platforms. Modern…

Telegram Purged Chinese Crypto Scam Markets—Then Watched as They Rebuilt
23
Jun
2025

Telegram Purged Chinese Crypto Scam Markets—Then Watched as They Rebuilt

Before they were taken down by Telegram, Xinbi Guarantee and Haowang Guarantee displayed similar posts offering explicitly illegal services in…

Critical Teleport Vulnerability Allows Remote Authentication Bypass
23
Jun
2025

Critical Teleport Vulnerability Allows Remote Authentication Bypass

A critical security vulnerability, tracked as CVE-2025-49825, has been discovered in Teleport, a widely used open-source platform for secure access…

Pro-Iranian Hackers
23
Jun
2025

DHS Warns Pro-Iranian Hackers Likely to Target U.S. Networks After Iranian Nuclear Strikes

Jun 23, 2025Ravie LakshmananHacktivism / Cyber Warfare The United States government has warned of cyber attacks mounted by pro-Iranian groups…

Widening Middle Eastern war increases cyber risk
23
Jun
2025

Widening Middle Eastern war increases cyber risk

With the United States entering a widening Middle Eastern conflict following a series airstrikes of airstrikes against nuclear targets in…

DHS warns of heightened cyber threat as US enters Iran conflict
23
Jun
2025

DHS warns of heightened cyber threat as US enters Iran conflict

The Department of Homeland Security warned Sunday of a higher risk of malicious cyber activity from Iran following the direct…