YouTube
08
Mar
2025

YouTubers extorted via copyright strikes to spread malware

Cybercriminals are sending bogus copyright claims to YouTubers to coerce them into promoting malware and cryptocurrency miners on their videos….

What Happens When Push Notifications Go Malicious? A Storm of Scams Awaits
08
Mar
2025

What Happens When Push Notifications Go Malicious?

Push notifications are a common feature that many websites use to keep users engaged. However, what happens when these notifications…

Jane Devry
08
Mar
2025

They’re Not Hacking Your Systems, They’re Hacking Your People: The AI-Powered Crisis We’re Ignoring

Business executives never think they’ll be victims of a cyberattack until it happens to them—and by that point, it’s already…

Cybercriminals Allegedly Used a StubHub Backdoor to Steal Taylor Swift Tickets
08
Mar
2025

Cybercriminals Allegedly Used a StubHub Backdoor to Steal Taylor Swift Tickets

As Donald Trump’s administration continues its relentless reorganization of the United States federal government, documents obtained by WIRED showed this…

Jane Devry
08
Mar
2025

AI and Automation: Key Pillars for Building Cyber Resilience

AI applications are embedded in our phones and becoming a vital part of life. To accelerate mainstream adoption, technology companies…

Jane Devry
08
Mar
2025

Securing the Cloud Frontier: How Organizations Can Prepare for 2025 Threats

As organizations accelerate their cloud adoption for cost-efficiency, scalability, and faster service delivery, cybercriminals are taking notice. Cloud technology has…

Lumma Stealer Using Fake Google Meet & Windows Update Sites to Launch “Click Fix” Style Attack
08
Mar
2025

Lumma Stealer Using Fake Google Meet & Windows Update Sites to Launch “Click Fix” Style Attack

Cybersecurity researchers continue to track sophisticated “Click Fix” style distribution campaigns that deliver the notorious Lumma Stealer malware to unsuspecting…

Jane Devry
08
Mar
2025

AI’s Edge in Cybersecurity: How It’s Detecting Threats Before They Happen

In November 2024, U.S. authorities charged multiple individuals for conducting cyberattacks on telecom and financial firms. They allegedly used phishing…

Women in Cybersecurity
08
Mar
2025

How Women In Cybersecurity Are Leading The AI Revolution

Artificial Intelligence (AI) is revolutionizing cybersecurity, enabling organizations to detect and respond to threats faster than ever. Yet, AI has…

Feds Link $150M Cyberheist to 2022 LastPass Hacks – Krebs on Security
08
Mar
2025

Feds Link $150M Cyberheist to 2022 LastPass Hacks – Krebs on Security

In September 2023, KrebsOnSecurity published findings from security researchers who concluded that a series of six-figure cyberheists across dozens of…

Jane Devry
08
Mar
2025

Four Ways Agentic AI Helps Lean Security Teams Defend Against Threats

Agentic AI is becoming a hot topic in the security community. This emerging technology has already taken other industries by…

Threat Actors Leverage YouTubers to Attack Windows Systems Via SilentCryptoMiner
08
Mar
2025

Threat Actors Leverage YouTubers to Attack Windows Systems Via SilentCryptoMiner

Security researchers have uncovered a sophisticated malware campaign where threat actors are coercing popular YouTubers to distribute SilentCryptoMiner malware disguised…