Chinese hacker
20
Feb
2025

Chinese hackers use custom malware to spy on US telecom networks

The Chinese state-sponsored Salt Typhoon hacking group uses a custom utility called JumbledPath to stealthily monitor network traffic and potentially…

Clinical Research Firm Exposes 1.6 Million US Medical Survey Records
20
Feb
2025

Clinical Research Firm Exposes 1.6 Million US Medical Survey Records

A Dallas, Texas-based clinical research firm had its database exposed, containing sensitive personal healthcare records of over 1.6 million individuals…

Naveen Goud
20
Feb
2025

Zero Day on Netflix explains well about the repercussions of a Cyber Attack

“Zero Day,” a gripping political thriller streaming on Netflix, delves into the far-reaching consequences of a devastating cyber attack. Premiering…

Cybersecurity jobs available right now in the USA: February 20, 2025
20
Feb
2025

Cybersecurity jobs available right now in the USA: February 20, 2025

Compliance & Privacy Specialist McKesson | Remote – View job details As a Compliance & Privacy Specialist, you will identify…

Wazuh header
20
Feb
2025

Integrating LLMs into security operations using Wazuh

Artificial intelligence (AI) is the simulation of human intelligence in machines, enabling systems to learn from data, recognize patterns, and…

Jane Devry
20
Feb
2025

Responsible AI: The Critical Competitive Advantage of 2025

Artificial intelligence (AI) has reached an inflection point. Once considered an experimental technology, AI is now embedded in the core…

Microsoft overcomes quantum barrier with new particle
20
Feb
2025

Microsoft overcomes quantum barrier with new particle

Microsoft has published the culmination of 20 years of research into subatomic particles, known as Majorana fermions, which it aims…

Microsoft
20
Feb
2025

Microsoft fixes Power Pages zero-day bug exploited in attacks

Microsoft has issued a security bulletin for a high-severity elevation of privilege vulnerability in Power Pages, which hackers exploited as…

Jane Devry
20
Feb
2025

The Human Factor: How Eliminating Human Vulnerabilities Can Stop Social Engineering Fraud

Fraud is becoming more sophisticated, targeting companies with increased precision, especially in two critical areas: Accounts Payable (AP) and Payment…

PRevent: Open-source tool to detect malicious code in pull requests
20
Feb
2025

PRevent: Open-source tool to detect malicious code in pull requests

Apiiro security researchers have released open source tools that can help organizations detect malicious code as part of their software…

DeepSeek found to be sharing user data with TikTok parent company ByteDance
20
Feb
2025

DeepSeek found to be sharing user data with TikTok parent company ByteDance

A couple of weeks ago we reported on the concerns surrounding data collection and security at DeepSeek, the Chinese AI…

North Korean Hackers Target Freelance Developers in Job Scam to Deploy Malware
20
Feb
2025

North Korean Hackers Target Freelance Developers in Job Scam to Deploy Malware

Freelance software developers are the target of an ongoing campaign that leverages job interview-themed lures to deliver cross-platform malware families…