NTT suffered a data breach that impacted 18,000 companies
08
Mar
2025

NTT suffered a data breach that impacted 18,000 companies

Japanese telecom giant NTT suffered a data breach that impacted 18,000 companies Pierluigi Paganini March 08, 2025 A data breach…

Kill switch
08
Mar
2025

Developer guilty of using kill switch to sabotage employer’s systems

A software developer has been found guilty of sabotaging his ex-employer’s systems by running custom malware and installing a “kill switch”…

ESP32
08
Mar
2025

Undocumented backdoor found in Bluetooth chip used by a billion devices

The ubiquitous ESP32 microchip made by Chinese manufacturer Espressif and used by over 1 billion units as of 2023 contains…

YouTube
08
Mar
2025

YouTubers extorted via copyright strikes to spread malware

Cybercriminals are sending bogus copyright claims to YouTubers to coerce them into promoting malware and cryptocurrency miners on their videos….

What Happens When Push Notifications Go Malicious? A Storm of Scams Awaits
08
Mar
2025

What Happens When Push Notifications Go Malicious?

Push notifications are a common feature that many websites use to keep users engaged. However, what happens when these notifications…

Jane Devry
08
Mar
2025

They’re Not Hacking Your Systems, They’re Hacking Your People: The AI-Powered Crisis We’re Ignoring

Business executives never think they’ll be victims of a cyberattack until it happens to them—and by that point, it’s already…

Cybercriminals Allegedly Used a StubHub Backdoor to Steal Taylor Swift Tickets
08
Mar
2025

Cybercriminals Allegedly Used a StubHub Backdoor to Steal Taylor Swift Tickets

As Donald Trump’s administration continues its relentless reorganization of the United States federal government, documents obtained by WIRED showed this…

Jane Devry
08
Mar
2025

AI and Automation: Key Pillars for Building Cyber Resilience

AI applications are embedded in our phones and becoming a vital part of life. To accelerate mainstream adoption, technology companies…

Jane Devry
08
Mar
2025

Securing the Cloud Frontier: How Organizations Can Prepare for 2025 Threats

As organizations accelerate their cloud adoption for cost-efficiency, scalability, and faster service delivery, cybercriminals are taking notice. Cloud technology has…

Lumma Stealer Using Fake Google Meet & Windows Update Sites to Launch “Click Fix” Style Attack
08
Mar
2025

Lumma Stealer Using Fake Google Meet & Windows Update Sites to Launch “Click Fix” Style Attack

Cybersecurity researchers continue to track sophisticated “Click Fix” style distribution campaigns that deliver the notorious Lumma Stealer malware to unsuspecting…

Jane Devry
08
Mar
2025

AI’s Edge in Cybersecurity: How It’s Detecting Threats Before They Happen

In November 2024, U.S. authorities charged multiple individuals for conducting cyberattacks on telecom and financial firms. They allegedly used phishing…

Women in Cybersecurity
08
Mar
2025

How Women In Cybersecurity Are Leading The AI Revolution

Artificial Intelligence (AI) is revolutionizing cybersecurity, enabling organizations to detect and respond to threats faster than ever. Yet, AI has…