Claude AI Exploited to Operate 100+ Fake Political Personas in Global Influence Campaign
01
May
2025

Claude AI Exploited to Operate 100+ Fake Political Personas in Global Influence Campaign

May 01, 2025Ravie LakshmananArtificial Intelligence / Disinformation Artificial intelligence (AI) company Anthropic has revealed that unknown threat actors leveraged its…

Microsoft commits to European datacentre footprint growth despite ‘geopolitical volatility’
01
May
2025

Microsoft commits to European datacentre footprint growth despite ‘geopolitical volatility’

Microsoft is preparing to increase its European datacentre capacity by 40% over the next two years and will appoint a…

Supply Chain Cybersecurity - CISO Risk Management Guide
01
May
2025

Supply Chain Cybersecurity – CISO Risk Management Guide

In today’s hyper-connected business environment, supply chains are no longer just about the physical movement of goods they are digital…

Tesla Model 3 VCSEC Vulnerability Lets Hackers Run Arbitrary Code
01
May
2025

Tesla Model 3 VCSEC Vulnerability Lets Hackers Run Arbitrary Code

A high security flaw in Tesla’s Model 3 vehicles, disclosed at the 2025 Pwn2Own hacking competition, allows attackers to execute…

Ticket Resale Platform TicketToCash Left 200GB of User Data Exposed
01
May
2025

Ticket Resale Platform TicketToCash Left 200GB of User Data Exposed

A misconfigured, non-password-protected database belonging to TicketToCash exposed data from 520,000 customers, including PII and partial financial details. Cybersecurity researcher…

Several locks presented in a row, with the lock in the middle broken in half
01
May
2025

The 3 biggest cybersecurity threats to small businesses

In an online world filled with extraordinarily sophisticated cyberattacks—including organized assaults on software supply chains, state-directed exploitations of undiscovered vulnerabilities,…

Why top SOC teams are shifting to Network Detection and Response
01
May
2025

Why top SOC teams are shifting to Network Detection and Response

Security Operations Center (SOC) teams are facing a fundamentally new challenge — traditional cybersecurity tools are failing to detect advanced…

Progress made on government’s Post Office Capture redress, but concerns remain
01
May
2025

Progress made on government’s Post Office Capture redress, but concerns remain

Former subpostmasters who suffered after being blamed for errors in the Post Office’s pre-Horizon software have said progress is being…

Prioritizing Patch Management - CISO's 2025 Focus
01
May
2025

Prioritizing Patch Management – CISO’s 2025 Focus

In 2025, with cybersecurity threats evolving at an unprecedented pace, effective patch management has never been more critical for organizational…

Netgear EX6200 Flaw Enables Remote Access and Data Theft
01
May
2025

Netgear EX6200 Flaw Enables Remote Access and Data Theft

Security researchers have disclosed three critical vulnerabilities in the Netgear EX6200 Wi-Fi range extender that could allow remote attackers to…

Google logo
01
May
2025

Zero-day attacks on browsers and smartphones drop, says Google

Cybercriminals are having less success targeting end-user technology with zero-day attacks, said Google’s security team this week. While most attacks…

DarkWatchman, Sheriff Malware Hit Russia and Ukraine with Stealth and Nation-Grade Tactics
01
May
2025

DarkWatchman, Sheriff Malware Hit Russia and Ukraine with Stealth and Nation-Grade Tactics

Russian companies have been targeted as part of a large-scale phishing campaign that’s designed to deliver a known malware called…