Katharine Hayhoe: The most important climate equation
23
Mar
2025

Katharine Hayhoe: The most important climate equation

The atmospheric scientist makes a compelling case for a head-to-heart-to-hands connection as a catalyst for climate action 17 Feb 2025…

No, you’re not fired – but beware of job termination scams
23
Mar
2025

No, you’re not fired – but beware of job termination scams

Some employment scams take an unexpected turn as cybercriminals shift from “hiring” to “firing” staff 18 Feb 2025  •  ,…

Fake job offers target coders with infostealers
23
Mar
2025

Fake job offers target coders with infostealers

A North Korea-aligned activity cluster tracked by ESET as DeceptiveDevelopment drains victims’ crypto wallets and steals their login details from…

Week in review: Veeam Backup & Replication RCE fixed, free file converter sites deliver malware
23
Mar
2025

Week in review: Veeam Backup & Replication RCE fixed, free file converter sites deliver malware

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Critical Veeam Backup & Replication…

Coinbase Attack Exposes 218 Repositories, Leaks CI/CD Secrets
23
Mar
2025

Coinbase Attack Exposes 218 Repositories, Leaks CI/CD Secrets

The supply chain attack involving the GitHub Action “tj-actions/changed-files” started as a highly-targeted attack against one of Coinbase’s open-source projects,…

How Cybercriminals Exploit Notification Channels
23
Mar
2025

How Cybercriminals Exploit Notification Channels

Cybercriminals are always looking for new ways to take advantage of people. One effective method they use is exploiting notification…

How Counterfeiters Use Technology to Fake Product Labels (and Strategies to Combat Fraud)
23
Mar
2025

How Counterfeiters Use Technology to Fake Product Labels (and Strategies to Combat Fraud)

Counterfeit products are a growing problem in today’s market. With advancements in technology, counterfeiters have become more skilled at creating…

Why AI Systems Need Red Teaming Now More Than Ever
23
Mar
2025

Why AI Systems Need Red Teaming Now More Than Ever

AI systems are becoming a huge part of our lives, but they are not perfect. Red teaming helps find weaknesses…

How Cybercriminals Exploit Public Info for Attacks: Understanding Risks and Prevention
22
Mar
2025

How Cybercriminals Exploit Public Info for Attacks: Understanding Risks and Prevention

Cybercriminals are skilled at using public information to their advantage. Knowing how they gather this data can help you protect…

U.S. Treasury removed sanctions against the crypto mixer service Tornado Cash
22
Mar
2025

U.S. Treasury removed sanctions against the crypto mixer service Tornado Cash

U.S. Treasury removed sanctions against the crypto mixer service Tornado Cash Pierluigi Paganini March 22, 2025 The U.S. Treasury is…

Microsoft
22
Mar
2025

Microsoft Trust Signing service abused to code-sign malware

Cybercriminals are abusing Microsoft’s Trusted Signing platform to code-sign malware executables with short-lived three-day certificates. Threat actors have long sought after…

Oracle Denies Breach Amid Hacker’s Claim of Access to 6 Million Records
22
Mar
2025

Oracle Denies Breach Amid Hacker’s Claim of Access to 6 Million Records

A recent investigation by CloudSEK’s XVigil platform has uncovered a cyberattack targeting Oracle Cloud, resulting in the exfiltration of six…