Iranian Cybergroup Toufan Targets Organizations to Steal Login Credentials
A pro-Palestinian cybergroup called Cyber Toufan, which means “cyber storm,” has become a serious threat to Israeli groups in the changing digital battlefield of the…
A pro-Palestinian cybergroup called Cyber Toufan, which means “cyber storm,” has become a serious threat to Israeli groups in the changing digital battlefield of the…
May 27, 2025Ravie Lakshmanan Cloud Security / Malware Microsoft has shed light on a previously undocumented cluster of threat activity originating from a Russia-affiliated threat…
Imec CEO Luc Van den hove opened ITF World 2025 by calling for “disruptive innovation over incremental change”. He underscored the need for tighter global…
Telstra Infraco has revealed an AI project that is helping the telco reduce reactive truck rolls to deal with power issues, saving “thousands of dollars”…
At this year’s Pwn2Own Berlin, security researchers successfully demonstrated two new zero-day exploits against Mozilla Firefox, targeting the browser’s content process. The vulnerabilities—CVE-2025-4918 and CVE-2025-4919—were…
A previously unknown Russian-backed cyberespionage group tracked as Void Blizzard has been linked to a September 2024 Dutch police security breach. As the Dutch national…
German sportswear giant Adidas has confirmed a data breach after cybercriminals accessed customer data through a third-party customer service provider. The breach, disclosed on May…
Threat hunters have exposed a novel campaign that makes use of search engine optimization (SEO) poisoning techniques to target employee mobile devices and facilitate payroll…
Weeks after the ‘Signalgate’ scandal broke, the problems exposed by White House officials using non-government encrypted messaging services are much larger than one app or…
From your email to your web browsing, it’s highly likely that your daily online life is dominated by a small number of tech giants—namely Google,…
Why Application Security is Non-Negotiable The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak…
The FBI is cautioning US law firms that they have become frequent targets of the Silent Ransom Group (SRG) extortion gang. Also known as Chatty…