WorkComposer employee monitoring
28
Apr
2025

Employee monitoring app exposes users, leaks 21+ million screenshots

Unfortunately, spyware apps with poor reputations and even weaker security practices are all too common. I’ve lost count of how…

A large-scale phishing campaign targets WordPress WooCommerce users
28
Apr
2025

A large-scale phishing campaign targets WordPress WooCommerce users

A large-scale phishing campaign targets WordPress WooCommerce users Pierluigi Paganini April 28, 2025 A large-scale phishing campaign targets WordPress WooCommerce…

Windows 11 25H2 Expected to Launch with Minor Changes
28
Apr
2025

Windows 11 25H2 Expected to Launch with Minor Changes

Microsoft is quietly preparing the next update to its flagship operating system, Windows 11 25H2, with new evidence pointing toward a…

Darcula Phishing Kit Uses AI to Evade Detection, Experts Warn
28
Apr
2025

Darcula Phishing Kit Uses AI to Evade Detection, Experts Warn

Darcula phishing platform adds AI to create multilingual scam pages easily. Netcraft warns of rising risks from Darcula-Suite upgrade. Cybersecurity…

Flashpoint Ignite enhancements improve threat intelligence
28
Apr
2025

Flashpoint Ignite enhancements improve threat intelligence

Flashpoint announced new capabilities to its flagship platform, Flashpoint Ignite. These innovations are designed to deliver insights that align with…

Aligning Cybersecurity with Business Goals
28
Apr
2025

Aligning Cybersecurity with Business Goals

Cybersecurity has rapidly evolved from a back-office technical concern to a boardroom imperative. As digital transformation accelerates and organizations embrace…

China Claims U.S. Cyberattack Targeted Leading Encryption Company
28
Apr
2025

China Claims U.S. Cyberattack Targeted Leading Encryption Company

China has accused U.S. intelligence agencies of carrying out a sophisticated cyberattack against one of its foremost commercial cryptography providers,…

JokerOTP Dismantled After 28,000 Phishing Attacks, 2 Arrested
28
Apr
2025

JokerOTP Dismantled After 28,000 Phishing Attacks, 2 Arrested

Two individuals have been arrested in a joint international operation dismantling JokerOTP, a sophisticated phishing tool used to intercept 2FA…

Breaking Down 5 Real Vulns
28
Apr
2025

Breaking Down 5 Real Vulns

Not every security vulnerability is high risk on its own – but in the hands of an advanced attacker, even…

Workers need more support for AI success
28
Apr
2025

Workers need more support for AI success

The UK could save £200bn if the workforce adopts artificial intelligence (AI) to improve productivity. That is the headline finding…

Car Subscription Features Raise Your Risk of Government Surveillance, Police Records Show
28
Apr
2025

Car Subscription Features Raise Your Risk of Government Surveillance, Police Records Show

What is also clear from the documents is that US police are aware of the control corporations have over their…

New iOS Vulnerability Could Brick iPhones with Just One Line of Code
28
Apr
2025

New iOS Vulnerability Could Brick iPhones with Just One Line of Code

A security researcher has uncovered a critical vulnerability in iOS, Apple’s flagship mobile operating system. The flaw, CVE-2025-24091, which leverages…