Aussie super funds targeted by fraudsters using stolen creds
12
Jun
2025

Australia’s super funds told to assess authentication controls

Superannuation funds have until the end of August to identify and flag any residual authentication control weaknesses in their environments…

Erie Insurance
12
Jun
2025

Erie Insurance confirms cyberattack behind business disruptions

Erie Insurance and Erie Indemnity Company have disclosed that a weekend cyberattack is behind the recent business disruptions and platform outages…

How to Adopt Advanced Edge Cybersecurity to Protect Smart Buildings
12
Jun
2025

How to Adopt Advanced Edge Cybersecurity to Protect Smart Buildings

The increasing digitization of smart buildings presents both unprecedented convenience and significant cybersecurity challenges. With the number of IoT devices globally…

A woman stands in front of a timetable that includes information about departing and arriving flights
12
Jun
2025

US airline industry quietly selling flight data to DHS

A data broker owned by some of America’s biggest airlines has been selling access to customer flight data to the…

Google names chief AI architect
12
Jun
2025

Google names chief AI architect

Google appointed an insider to lead its future AI-powered product development, as AI enters a new phase of mainstream adoption, according…

INTERPOL dismantles 20,000+ malicious IPs in major cybercrime crackdown
12
Jun
2025

INTERPOL dismantles 20,000+ malicious IPs in major cybercrime crackdown

Operation Secure: INTERPOL dismantles 20,000+ malicious IPs in major cybercrime crackdown Pierluigi Paganini June 11, 2025 INTERPOL announced that a…

Air-gapped
12
Jun
2025

SmartAttack uses smartwatches to steal data from air-gapped systems

A new attack dubbed ‘SmartAttack’ uses smartwatches as a covert ultrasonic signal receiver to exfiltrate data from physically isolated (air-gapped)…

ConnectWise to Rotate Code Signing Certificates for ScreenConnect, Automate and RMM
12
Jun
2025

ConnectWise to Rotate Code Signing Certificates for ScreenConnect, Automate and RMM

The urgency stems from requirements imposed by technology partners, which necessitated an accelerated timeline for implementation across all affected products….

How To Leverage Cloud Analytics to Detect and Prevent Cybersecurity Threats in Real-Time
12
Jun
2025

How To Leverage Cloud Analytics to Detect and Prevent Cybersecurity Threats in Real-Time

Today, cloud environments are more complex than ever. Organizations are navigating multicloud, multi-tenant, multi-national, and multi-business unit landscapes. On top…

Linux Malware Authors Targeting Cloud Environments with ELF Binaries
12
Jun
2025

Linux Malware Authors Targeting Cloud Environments with ELF Binaries

Unit 42, Palo Alto Networks’ threat intelligence division, has recently conducted investigations that have revealed a worrying trend: threat actors…

Salesforce blocks AI rivals from using Slack data
12
Jun
2025

Salesforce blocks AI rivals from using Slack data

Slack, a Salesforce-owned workplace messaging app, recently blocked other software firms from searching or storing Slack messages, The Information reported,…

20,000 Malicious IPs and Domains Linked to 69 Malware Variants Dismantled
12
Jun
2025

20,000 Malicious IPs and Domains Linked to 69 Malware Variants Dismantled

More than 20,000 malicious IP addresses and domains linked to information stealers have been taken down in an INTERPOL-coordinated operation…