AI agents have access to key data across the enterprise
30
May
2025

AI agents have access to key data across the enterprise

82% of organizations already use AI agents, but only 44% of organizations report having policies in place to secure them,…

ClickFix CAPTCHA
30
May
2025

New EDDIESTEALER Malware Bypasses Chrome’s App-Bound Encryption to Steal Browser Data

A new malware campaign is distributing a novel Rust-based information stealer dubbed EDDIESTEALER using the popular ClickFix social engineering tactic…

Trump, DEI and UK technology businesses
30
May
2025

Trump, DEI and UK technology businesses

What does US retrenchment on Diversity, Equality and Inclusion, mean for tech companies in the UK, and could a similar…

Firebase, Google Apps Script Abused in Fresh Phishing Campaigns
30
May
2025

Firebase, Google Apps Script Abused in Fresh Phishing Campaigns

Cybersecurity researchers are calling attention to two recently observed phishing campaigns caught abusing the legitimate services Firebase and Google Apps…

ConnectWise suffered a cyberattack carried out by a sophisticated nation state actor
30
May
2025

ConnectWise suffered a cyberattack carried out by a sophisticated nation state actor

ConnectWise suffered a cyberattack carried out by a sophisticated nation state actor Pierluigi Paganini May 30, 2025 ConnectWise detected suspicious…

ATSE Welcomes Coalition Shadow Ministry Appointments
30
May
2025

ATSE Welcomes Coalition Shadow Ministry Appointments

The Australian Academy of Technological Sciences and Engineering (ATSE) welcomed Melissa Price’s appointment as shadow minister for cybersecurity and the…

Sprocket header image
30
May
2025

Attackers are mapping your attack surface—are you?

Today’s threat landscape, attack surfaces are expanding faster than most security teams can track. Every new cloud asset, exposed API,…

AI Security for Low/No-Code and Vibe Coded Applications
30
May
2025

AI Security for Low/No-Code and Vibe Coded Applications

Companies want results fast, and low/no-code (LCNC) and Vibe Coding platforms promise just that: rapid application development with either no…

Pure Crypter Uses Multiple Evasion Methods to Bypass Windows 11 24H2 Security Features
30
May
2025

Pure Crypter Uses Multiple Evasion Methods to Bypass Windows 11 24H2 Security Features

Pure Crypter, a well-known malware-as-a-service (MaaS) loader, has been recognized as a crucial tool for threat actors targeting Windows-based systems…

Threat Actor Claims TikTok Breach, Puts 428 Million Records Up for Sale
30
May
2025

Threat Actor Claims TikTok Breach, Puts 428 Million Records Up for Sale

A newly emerged threat actor, going by the alias “Often9,” has posted on a prominent cybercrime and database trading forum,…

The Global Cybercrime Industry As A Country
30
May
2025

The Global Cybercrime Industry As A Country

To understand the magnitude of the modern cybersecurity threat, it’s instructive to think of the global cybercrime industry as a…

Using AI to outsmart AI-driven phishing scams
30
May
2025

Using AI to outsmart AI-driven phishing scams

Phishing scams used to be filled with awkward wording and obvious grammar mistakes. Not anymore. AI is now making it…