Compliance Platform Vanta Exposes Customer Info via Software Bug
03
Jun
2025

Code Bug at Compliance Firm Vanta Leaks Customer Data to Other Clients

Compliance automation provider Vanta confirms a software bug exposed private customer data to other users, impacting hundreds of clients. Learn…

Top ransomware groups - SafePay, Qilin, Akira, Play
03
Jun
2025

SafePay, DevMan Emerge As Major Ransomware Threats

SafePay’s journey to the top of the ransomware leaderboard was a quick one. The SafePay ransomware group first emerged in…

UK Cyberwarfare
03
Jun
2025

The UK Brings Cyberwarfare Out of the Closet

The UK’s 2025 Strategic Defence Review (SDR) details a plan to integrate its military defensive and offensive capabilities through increased…

CrowdStrike, Microsoft aim to eliminate confusion in threat group attribution
03
Jun
2025

CrowdStrike, Microsoft aim to eliminate confusion in threat group attribution

CrowdStrike and Microsoft announced an agreement Monday to formally connect the different names each company uses for the same threat…

RubyGems
03
Jun
2025

Malicious RubyGems pose as Fastlane to steal Telegram API data

Two malicious RubyGems packages posing as popular Fastlane CI/CD plugins redirect Telegram API requests to attacker-controlled servers to intercept and…

CISOs Role in Driving Secure Digital Transformation
03
Jun
2025

CISOs Role in Driving Secure Digital Transformation

As cybercrime costs surge toward an estimated $10.5 trillion annually by 2025, Chief Information Security Officers (CISOs) are stepping out…

How the Farm Industry Spied on Animal Rights Activists and Pushed the FBI to Treat Them as Bioterrorists
03
Jun
2025

How the Farm Industry Spied on Animal Rights Activists and Pushed the FBI to Treat Them as Bioterrorists

Hundreds of emails and internal documents reviewed by WIRED reveal top lobbyists and representatives of America’s agricultural industry led a…

Researchers Reveal Container-Based Attacks Through Host-Based Log Analysis
03
Jun
2025

Researchers Reveal Container-Based Attacks Through Host-Based Log Analysis

Cybersecurity researchers have shed light on the often-underestimated vulnerabilities in containerized environments, emphasizing the critical role of host-based log analysis…

The Role of Continuous Integration and Continuous Deployment (CI/CD) in DevOps
03
Jun
2025

The Role of Continuous Integration and Continuous Deployment (CI/CD) in DevOps

Modern software development demands rapid delivery of high-quality applications that can adapt to changing business requirements and user expectations. Continuous…

Scammers are constantly changing the game, but so are we. Introducing Malwarebytes Scam Guard
03
Jun
2025

Scammers are constantly changing the game, but so are we. Introducing Malwarebytes Scam Guard

Mobile scams are becoming increasingly sophisticated, leaving people vulnerable to cybercriminals.   We recently reported on the ever-increasing number of…

Trump’s cyber nominees gain broad industry support
03
Jun
2025

Trump’s cyber nominees gain broad industry support

Listen to the article 4 min This audio is auto-generated. Please let us know if you have feedback. Dive Brief:…

Experts endorse Sean Cairncross for national cyber director ahead of Senate hearing
03
Jun
2025

Experts endorse Sean Cairncross for national cyber director ahead of Senate hearing

President Donald Trump’s pick to serve as national cyber director was endorsed by a collection of cyber experts days before…