Crooks stole +$200 million from crypto exchange Cetus Protocol
27
May
2025

Crooks stole +$200 million from crypto exchange Cetus Protocol

Crooks stole over $200 million from crypto exchange Cetus Protocol Pierluigi Paganini May 27, 2025 Cetus Protocol reported a $223…

How Google Meet Pages Are Exploited to Deliver PowerShell Malware
27
May
2025

How Google Meet Pages Are Exploited to Deliver PowerShell Malware

A new wave of cyberattacks exploits user trust in Google Meet by deploying meticulously crafted fake meeting pages that trick…

4.5% of breaches now extend to fourth parties
27
May
2025

4.5% of breaches now extend to fourth parties

Security teams can no longer afford to treat third-party security as a compliance checkbox, according to SecurityScorecard. Traditional vendor risk…

How AI agents reshape industrial automation and risk management
27
May
2025

How AI agents reshape industrial automation and risk management

In this Help Net Security interview, Michael Metzler, Vice President Horizontal Management Cybersecurity for Digital Industries at Siemens, discusses the…

How well do you know your remote IT worker?
27
May
2025

How well do you know your remote IT worker?

Is the remote IT worker you recently hired really who he says he is? Fake IT workers are slipping into…

Cybersecurity jobs available right now: May 27, 2025
27
May
2025

Cybersecurity jobs available right now: May 27, 2025

Application Security Engineer, SDO AppSec Amazon | EMEA | Hybrid – View job details As an Application Security Engineer, SDO…

Threat Actors Deploy Database Client Tools on Targeted Systems to Exfiltrate Sensitive Data
27
May
2025

Threat Actors Deploy Database Client Tools on Targeted Systems to Exfiltrate Sensitive Data

Cybersecurity experts have noted an increase in data breaches where threat actors are directly querying internal databases to steal sensitive…

Katz Stealer Targets Chrome, Edge, Brave, and Firefox to Steal Login Credentials
27
May
2025

Katz Stealer Targets Chrome, Edge, Brave, and Firefox to Steal Login Credentials

Katz Stealer has emerged as a potent credential-stealing malware-as-a-service, targeting popular web browsers such as Chrome, Edge, Brave, and Firefox….

Services Australia refines public data to guide external AI use
27
May
2025

Services Australia refines public data to guide external AI use

Services Australia is wary of how external AI tools are consuming and referencing its information, with targeted adjustments being made…

Fake DigiYatra Apps Target Indian Users to Steal Financial Data
27
May
2025

Fake DigiYatra Apps Target Indian Users to Steal Financial Data

Threat actors have been exploiting the trust in India’s digital public infrastructure by setting up a deceptive phishing site, digiyatra[.]in,…

Defence trials AI radiocomms deception technology
27
May
2025

Defence trials AI radiocomms deception technology

The Australian Army is trialling technology that generates fake radio communications in order to mislead adversaries and protect frontline personnel….

FBI Issues on Silent Ransom Group Using Fake IT Support Calls to Target Victims
26
May
2025

FBI Issues on Silent Ransom Group Using Fake IT Support Calls to Target Victims

The Federal Bureau of Investigation (FBI) has issued a critical alert regarding the escalating activities of the cyber threat actor…