A cyber attack briefly disrupted South African Airways operations
09
May
2025

A cyber attack briefly disrupted South African Airways operations

A cyber attack briefly disrupted South African Airways operations Pierluigi Paganini May 09, 2025 A cyberattack briefly disrupted South African…

Senators move to quash the use of Chinese AI system by federal contractors 
09
May
2025

Senators move to quash the use of Chinese AI system by federal contractors 

A bipartisan Senate bill would formally ban the use of DeepSeek by federal contractors, part of a larger effort to…

Hospital
09
May
2025

Ascension says recent data breach affects over 430,000 patients

Ascension, one of the largest private healthcare systems in the United States, has revealed that a data breach disclosed last…

Hackers Weaponizing Facebook Ads to Deploy Multi-Stage Malware Attacks
09
May
2025

Hackers Weaponizing Facebook Ads to Deploy Multi-Stage Malware Attacks

A persistent and highly sophisticated malvertising campaign on Facebook has been uncovered by Bitdefender Labs, exploiting the trust associated with…

Chrome logo
09
May
2025

Google Chrome will use AI to block tech support scam websites

Google has expressed plans to use Artificial Intelligence (AI) to stop tech support scams in Chrome. With the launch of…

OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities
09
May
2025

OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities

The North Korean threat actors behind the Contagious Interview campaign have been observed using updated versions of a cross-platform malware…

New Stealthy .NET Malware Hiding Malicious Payloads within bitmap resources
09
May
2025

New Stealthy .NET Malware Hiding Malicious Payloads within bitmap resources

Cybersecurity researchers at Palo Alto Networks’ Unit 42 have uncovered a novel obfuscation method employed by threat actors to conceal…

BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S.
09
May
2025

BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S.

A joint law enforcement operation undertaken by Dutch and U.S. authorities has dismantled a criminal proxy network that’s powered by…

US Customs and Border Protection Plans to Photograph Everyone Exiting the US by Car
09
May
2025

US Customs and Border Protection Plans to Photograph Everyone Exiting the US by Car

United States Customs and Border Protection plans to log every person leaving the country by vehicle by taking photos at…

Cyberattackers Targeting IT Help Desks for Initial Breach
09
May
2025

Cyberattackers Targeting IT Help Desks for Initial Breach

Cybercriminals are increasingly impersonating IT support personnel and trusted authorities to manipulate victims into granting access to critical systems, according…

Broadcom letters demonstrate push to VMware subscriptions
09
May
2025

Broadcom letters demonstrate push to VMware subscriptions

Concerns over support for VMware recently made the headlines following a critical vulnerability and the subsequent patch, which was limited…

Critical vulnerability in SAP NetWeaver under threat of active exploitation
09
May
2025

SAP NetWeaver exploitation enters second wave of threat activity

A second wave of cyberattacks is targeting a critical vulnerability in SAP NetWeaver Visual Composer, according to researchers. Following the…