Cloak Ransomware Hits Virginia Attorney General’s Office, Disrupts IT Systems
24
Mar
2025

Cloak Ransomware Hits Virginia Attorney General’s Office, Disrupts IT Systems

A cybercriminal collective, known as Cloak, has confirmed its involvement in an attack targeting the Virginia attorney general’s office in…

How cyber-secure is your business?
24
Mar
2025

How cyber-secure is your business?

As cybersecurity is a make-or-break proposition for businesses of all sizes, can your organization’s security strategy keep pace with today’s…

Critical Chrome Vulnerability Allows Attackers to Execute Arbitrary Code
24
Mar
2025

Critical Chrome Vulnerability Allows Attackers to Execute Arbitrary Code

Google has recently rolled out a critical security update for its Chrome browser, addressing vulnerabilities that could potentially allow attackers…

Arsen Introduces AI-Powered Phishing Tests to Improve Social Engineering Resilience
24
Mar
2025

Arsen Introduces AI-Powered Phishing Tests to Improve Social Engineering Resilience

Paris, France, March 24th, 2025, CyberNewsWire Arsen, a leading cybersecurity company specializing in social engineering defense, today announced the full…

cybernewswire
24
Mar
2025

Arsen Introduces AI-Powered Phishing Tests to Improve Social Engineering Resilience

Paris, France, March 24th, 2025, CyberNewsWire Arsen, a leading cybersecurity company specializing in social engineering defense, today announced the full…

Critical Next.js Vulnerability Allows Attackers to Bypass Middleware Authorization Checks
24
Mar
2025

Critical Next.js Vulnerability Allows Attackers to Bypass Middleware Authorization Checks

Mar 24, 2025Ravie LakshmananVulnerability / Web Security A critical security flaw has been disclosed in the Next.js React framework that…

Astral Foods Cyberattack
24
Mar
2025

Astral Foods’ Profit Plunges After Cyberattack

South Africa-listed poultry producer Astral Foods (ARLJ.J) has reported a cybersecurity incident that disrupted its operations and is expected to…

Tony Anscombe
24
Mar
2025

Can AI systems be socially engineered?

Could attackers use seemingly innocuous prompts to manipulate an AI system and even make it their unwitting ally? 12 Dec…

SvcStealer Malware Strikes, Harvesting Sensitive Data from Browsers and Applications
24
Mar
2025

SvcStealer Malware Strikes, Harvesting Sensitive Data from Browsers and Applications

A new strain of malware, known as SvcStealer, has emerged as a significant threat in the cybersecurity landscape. This malware…

iProov Workforce MFA mitigates risk of account takeovers
24
Mar
2025

iProov Workforce MFA mitigates risk of account takeovers

iProov launched iProov Workforce MFA. This device-independent, FIDO Alliance-certified, biometric authentication solution helps organizations mitigate the risk of one of…

Oracle plants agentic AI flag in business process automation
24
Mar
2025

Oracle plants agentic AI flag in business process automation

Oracle has put forward its AI Agent Studio for Fusion Applications as a platform for orchestrating artificial intelligence (AI) agents…

Why a CVSS score of 7.5 may be a 10 in your organization
24
Mar
2025

Why a CVSS score of 7.5 may be a 10 in your organization

Aggregate vulnerability scores don’t tell the whole story – the relationship between a flaw’s public severity rating and the specific…