Build a mobile hacking rig with a Pixel and Kali NetHunter
12
Jun
2025

Build a mobile hacking rig with a Pixel and Kali NetHunter

A cybersecurity hobbyist has built a compact, foldable mobile hacking rig that runs Kali NetHunter on a Google Pixel 3…

Rick Bohm on AI, Collaboration & API Security Future
12
Jun
2025

Rick Bohm on AI, Collaboration & API Security Future

Nestled in a log cabin high in the Rocky Mountains, Rick Bohm starts his day the same way he’s approached…

Cybercriminals are turning stolen data into a thriving black market
12
Jun
2025

Cybercriminals are turning stolen data into a thriving black market

Cybercriminals are stealing data and running full-scale businesses around it. Europol’s latest Internet Organised Crime Threat Assessment (IOCTA) report reveals…

CISA Issues Comprehensive Guide to Safeguard Network Edge Devices from Cyber Threats
12
Jun
2025

CISA Issues Comprehensive Guide to Safeguard Network Edge Devices from Cyber Threats

The Cybersecurity and Infrastructure Security Agency (CISA), in partnership with international cybersecurity authorities, announced the release of comprehensive guidance to…

Want fewer security fires to fight? Start with threat modeling
12
Jun
2025

Want fewer security fires to fight? Start with threat modeling

CISOs understand that threat modeling helps teams identify risks early and build safer systems. But outside the security org, the…

Open-Source TeamFiltration Tool
12
Jun
2025

Over 80,000 Microsoft Entra ID Accounts Targeted Using Open-Source TeamFiltration Tool

Jun 12, 2025Ravie LakshmananEnterprise Security / Active Directory Cybersecurity researchers have uncovered a new account takeover (ATO) campaign that leverages…

CISOs call for operational threat intelligence integration
12
Jun
2025

CISOs call for operational threat intelligence integration

98% of CISOs face challenges when using threat intelligence, according to Trellix. The biggest problems are keeping up with changing…

Email security risks healthcare IT can’t afford to ignore
12
Jun
2025

Email security risks healthcare IT can’t afford to ignore

92% of healthcare IT leaders say they’re confident in their ability to prevent email-based data breaches, but according to Paubox,…

Zero-Click Microsoft 365 Copilot Vulnerability Let Attackers Exfiltrates Sensitive Data Abusing Teams
12
Jun
2025

Zero-Click Microsoft 365 Copilot Vulnerability Let Attackers Exfiltrates Sensitive Data Abusing Teams

A critical zero-click vulnerability in Microsoft 365 Copilot, dubbed “EchoLeak,” enables attackers to automatically exfiltrate sensitive organizational data without requiring…

44% of mobile users encounter scams every day
12
Jun
2025

44% of mobile users encounter scams every day

Nearly half of of mobile users encounter mobile scams daily, with people in the US and UK more likely to…

12
Jun
2025

The Northern Beaches Women’s Shelter hones focus on tech-enabled abuse

The Northern Beaches Women’s Shelter (NBWS) is seeking assistance on behalf of vulnerable women experiencing technology-enabled and cyber abuse, a…

Webjet Group appoints tech-based marketing chief
12
Jun
2025

Webjet Group appoints tech-based marketing chief

Webjet Group has appointed Oonagh Flanagan as its first chief marketing officer in Australia as it enters a “new era…