89% of Enterprise GenAI Usage Is Invisible to Organizations Exposing Critical Security Risks, New Report Reveals
27
Feb
2025

89% of Enterprise GenAI Usage Is Invisible to Organizations Exposing Critical Security Risks, New Report Reveals

Feb 27, 2025The Hacker NewsArtificial Intelligence / Browser Security Organizations are either already adopting GenAI solutions, evaluating strategies for integrating…

CVE volumes head towards 50,000 in 2025, analysts claim
27
Feb
2025

CVE volumes head towards 50,000 in 2025, analysts claim

A heady mixture of converging trends is likely to cause the volume of disclosed common vulnerabilities and exposures (CVEs) to…

Yodobashi Camera Users Under Attack from a New Wave of Phishing Attack
27
Feb
2025

Yodobashi Camera Users Under Attack from a New Wave of Phishing Attack

A new wave of phishing attacks impersonating Japanese electronics retail giant Yodobashi Camera has emerged, leveraging urgency and brand trust…

LuckyStrike Agent Malware
27
Feb
2025

Space Pirates Targets Russian IT Firms With New LuckyStrike Agent Malware

Feb 27, 2025Ravie LakshmananMalware / Network Security The threat actor known as Space Pirates has been linked to a malicious…

Outlook
27
Feb
2025

Microsoft fixes Outlook drag-and-drop broken by Windows updates

​Microsoft has fixed a known issue that broke email and calendar drag-and-drop in classic Outlook after installing recent updates on…

OpenSSF Released Security Baseline for Linux Projects
27
Feb
2025

OpenSSF Released Security Baseline for Linux Projects

The Open Source Security Foundation (OpenSSF) has launched the Open Source Project Security Baseline (OSPS Baseline), a tiered framework designed…

Google’s SafetyCore App Secretly Scans All Photos on Android Devices
27
Feb
2025

Google’s SafetyCore App Secretly Scans All Photos on Android Devices

Recent revelations about Google’s SafetyCore app have ignited a firestorm of privacy debates, echoing Apple’s recent controversy over photo scanning….

Print Friendly, PDF & Email
27
Feb
2025

Forecasting Data Security and Compliance Trends in 2025

The cybersecurity and compliance landscape in 2025 is more complex and challenging than ever before. The rapid evolution of cyber…

Angry Likho APT Resurfaces with Lumma Stealer Attacks Against Russia
27
Feb
2025

Angry Likho APT Resurfaces with Lumma Stealer Attacks Against Russia

Cybersecurity researchers at Kaspersky’s Securelist have found a cyber espionage group known as Angry Likho APT (also referred to as Sticky Werewolf by some…

10 High Growth Cybersecurity Stocks To Buy
27
Feb
2025

10 High Growth Cybersecurity Stocks To Buy

The cybersecurity industry is experiencing unprecedented growth, fueled by increasing cyber threats, the expansion of cloud computing, and the adoption of…

Cisco Nexus Vulnerability Let Attackers Inject Malicious Commands
27
Feb
2025

Cisco Nexus Vulnerability Let Attackers Inject Malicious Commands

Cisco Systems has issued a critical security advisory addressing a command injection vulnerability in its Nexus 3000 and 9000 Series…

UAC-0173 tools & tactics
27
Feb
2025

UAC-0173 Cyberattack Targets Ukraine’s Notary Offices

CERT-UA, the Governmental Computer Emergency Response Team of Ukraine, reported a resurgence of the notorious criminal group UAC-0173. This group,…