Week in review: NIST selects HQC for post-quantum encryption, 10 classic cybersecurity books
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: NIST selects HQC as backup...
Read more →Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: NIST selects HQC as backup...
Read more →A ransomware attack hit the Micronesian state of Yap, causing the health system network to go down. Pierluigi Paganini March...
Read more →Security researcher Yohanes Nugroho has released a decryptor for the Linux variant of Akira ransomware, which utilizes GPU power to...
Read more →New MassJacker clipper targets pirated software seekers Pierluigi Paganini March 15, 2025 Pirated software seekers are targeted by the new...
Read more →Cybersecurity tips to protect your cryptocurrency from hackers, scams, and fraud. Learn best practices for securing digital assets and staying...
Read more →Cybersecurity researchers have discovered that DeepSeek R1, an open-source large language model, can be manipulated to create functioning malware despite...
Read more →Artificial Intelligence (AI) has significantly transformed various sectors, offering tools that enhance efficiency and innovation. However, the emergence of uncensored...
Read more →Knifings, firebombings, shootings, and murder-for-hire plots—all linked to a splinter group of the 764 crime network called “No Lives Matter.”...
Read more →Cisco IOS XR flaw allows attackers to crash BGP process on routers Pierluigi Paganini March 15, 2025 Cisco addressed a denial...
Read more →The rise of remote work has significantly increased the attack surface for cybercriminals, making robust cybersecurity tools more critical than...
Read more →Mar 15, 2025Ravie Lakshmanan Malware / Supply Chain Security Cybersecurity researchers have warned of a malicious campaign targeting users of...
Read more →While cybercriminals innovate at lightning speed, cybersecurity teams—led by Chief Information Security Officers (CISOs)—often find themselves relying on outdated playbooks....
Read more →