GitHub
16
Mar
2025

Fake “Security Alert” issues on GitHub use OAuth app to hijack accounts

A widespread phishing campaign has targeted nearly 12,000 GitHub repositories with fake “Security Alert” issues, tricking developers into authorizing a…

Microsoft 365
16
Mar
2025

Malicious Adobe, DocuSign OAuth apps target Microsoft 365 accounts

Cybercriminals are promoting malicious Microsoft OAuth apps that masquerade as Adobe and DocuSign apps to deliver malware and steal Microsoft…

How Cybersecurity is Evolving in 2025 to Tackle New Threats
16
Mar
2025

How Cybersecurity is Evolving in 2025 to Tackle New Threats

The cybersecurity landscape continues to evolve at breakneck speed. In the U.S., regulatory policy at the federal level – for…

LockBit Developer Rostislav Panev Extradited from Israel to the US
16
Mar
2025

LockBit Developer Rostislav Panev Extradited from Israel to the US

The US extradites LockBit ransomware developer, Rostislav Panev, from Israel. Learn how his arrest impacts the fight against cybercrime and…

Week in review: NIST selects HQC for post-quantum encryption, 10 classic cybersecurity books
16
Mar
2025

Week in review: NIST selects HQC for post-quantum encryption, 10 classic cybersecurity books

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: NIST selects HQC as backup…

A ransomware attack hit the Micronesian state of Yap, causing the health system network to go down.
16
Mar
2025

A ransomware attack hit the Micronesian state of Yap, causing the health system network to go down.

A ransomware attack hit the Micronesian state of Yap, causing the health system network to go down. Pierluigi Paganini March…

Key
16
Mar
2025

New Akira ransomware decryptor cracks encryptions keys using GPUs

Security researcher Yohanes Nugroho has released a decryptor for the Linux variant of Akira ransomware, which utilizes GPU power to…

New MassJacker clipper targets pirated software seekers
15
Mar
2025

New MassJacker clipper targets pirated software seekers

New MassJacker clipper targets pirated software seekers Pierluigi Paganini March 15, 2025 Pirated software seekers are targeted by the new…

Cybersecurity in Crypto: Best Practices to Prevent Theft and Fraud
15
Mar
2025

Best Practices to Prevent Theft and Fraud

Cybersecurity tips to protect your cryptocurrency from hackers, scams, and fraud. Learn best practices for securing digital assets and staying…

DeepSeek R1 Jailbreaked To Develop Malware, Such As A Keylogger And Ransomware
15
Mar
2025

DeepSeek R1 Jailbreaked To Develop Malware, Such As A Keylogger And Ransomware

Cybersecurity researchers have discovered that DeepSeek R1, an open-source large language model, can be manipulated to create functioning malware despite…

How Ghostgpt Is Empowering Cybercrime in The Age Of AI
15
Mar
2025

How Ghostgpt Is Empowering Cybercrime in The Age Of AI

Artificial Intelligence (AI) has significantly transformed various sectors, offering tools that enhance efficiency and innovation. However, the emergence of uncensored…

End-to-End Encrypted Texts Between Android and iPhone Are Coming
15
Mar
2025

End-to-End Encrypted Texts Between Android and iPhone Are Coming

Knifings, firebombings, shootings, and murder-for-hire plots—all linked to a splinter group of the 764 crime network called “No Lives Matter.”…