HellCat Ransomware Hits 4 Firms using Infostealer-Stolen Jira Credentials
08
Apr
2025

HellCat Ransomware Hits 4 Firms using Infostealer-Stolen Jira Credentials

Cybersecurity researchers at Hudson Rock have identified a new wave of cyber attacks by the HellCat ransomware group, this time…

AI + Security: The Past, Present, and Future. A Documentary.
08
Apr
2025

AI + Security: The Past, Present, and Future. A Documentary.

This week in cybersecurity from the editors at Cybercrime Magazine –Watch the YouTube video Sausalito, Calif. – Apr. 8, 2025…

11 cyber defense tips to stay secure at work and home
08
Apr
2025

11 cyber defense tips to stay secure at work and home

Cybersecurity is inextricably tied to the technology it protects. Just as technology continues to grow in variety, quantity, and presence…

Global law firm Freshfields embarks on AI-led digital transformation with Google Cloud
08
Apr
2025

Global law firm Freshfields embarks on AI-led digital transformation with Google Cloud

Global law firm Freshfields has outlined its commitment to ensuring all 5,700 of its staff can confidently use artificial intelligence…

An Oversimplification of the Subprime Morgage Crisis
08
Apr
2025

An Oversimplification of the Subprime Morgage Crisis

I’m not an economist, but I read a lot. Here’s what happened: greed + stupidity. Greed on the part of…

Threat Actors May Leverage CI/CD Environments to Gain Access To Restricted Resources
08
Apr
2025

Threat Actors May Leverage CI/CD Environments to Gain Access To Restricted Resources

Cybersecurity experts have observed a concerning trend where sophisticated threat actors are increasingly targeting Continuous Integration/Continuous Deployment (CI/CD) pipelines to…

Android logo
08
Apr
2025

Google fixes two actively exploited zero-day vulnerabilities in Android

Google has patched 62 vulnerabilities in Android, including two actively exploited zero-days in its April 2025 Android Security Bulletin. When…

Malicious Excel Files Targeting Ukraine
08
Apr
2025

UAC-0226 Deploys GIFTEDCROOK Stealer via Malicious Excel Files Targeting Ukraine

The Computer Emergency Response Team of Ukraine (CERT-UA) has revealed a new set of cyber attacks targeting Ukrainian institutions with…

What is the impact of US tariffs on datacentre equipment costs?
08
Apr
2025

What is the impact of US tariffs on datacentre equipment costs?

There has been turmoil across global financial markets following the introduction of the new US tariffs, and datacentre equipment providers…

ASEAN
08
Apr
2025

Cybersecurity In ASEAN: Balancing Innovation And Risk

By Salleh Kodri, SE Regional Manager, Cyble The rapid digitalization of ASEAN economies has unlocked immense opportunities for growth and innovation….

Apple vs. AT&T | Daniel Miessler
08
Apr
2025

Apple vs. AT&T | Daniel Miessler

As you may have heard, AT&T’s chief executive disclosed last week that the second version of the iPhone will be…

Google to Patch 23-years Old Chrome Vulnerability That Leaks Browsing History
08
Apr
2025

Google to Patch 23-years Old Chrome Vulnerability That Leaks Browsing History

Google has announced a significant security improvement for Chrome version 136. This update addresses a 23-year-old vulnerability that could allow…