16
Mar
2025

Week in review: NIST selects HQC for post-quantum encryption, 10 classic cybersecurity books

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: NIST selects HQC as backup…

A ransomware attack hit the Micronesian state of Yap, causing the health system network to go down.
16
Mar
2025

A ransomware attack hit the Micronesian state of Yap, causing the health system network to go down.

A ransomware attack hit the Micronesian state of Yap, causing the health system network to go down. Pierluigi Paganini March…

Key
16
Mar
2025

New Akira ransomware decryptor cracks encryptions keys using GPUs

Security researcher Yohanes Nugroho has released a decryptor for the Linux variant of Akira ransomware, which utilizes GPU power to…

New MassJacker clipper targets pirated software seekers
15
Mar
2025

New MassJacker clipper targets pirated software seekers

New MassJacker clipper targets pirated software seekers Pierluigi Paganini March 15, 2025 Pirated software seekers are targeted by the new…

Cybersecurity in Crypto: Best Practices to Prevent Theft and Fraud
15
Mar
2025

Best Practices to Prevent Theft and Fraud

Cybersecurity tips to protect your cryptocurrency from hackers, scams, and fraud. Learn best practices for securing digital assets and staying…

DeepSeek R1 Jailbreaked To Develop Malware, Such As A Keylogger And Ransomware
15
Mar
2025

DeepSeek R1 Jailbreaked To Develop Malware, Such As A Keylogger And Ransomware

Cybersecurity researchers have discovered that DeepSeek R1, an open-source large language model, can be manipulated to create functioning malware despite…

How Ghostgpt Is Empowering Cybercrime in The Age Of AI
15
Mar
2025

How Ghostgpt Is Empowering Cybercrime in The Age Of AI

Artificial Intelligence (AI) has significantly transformed various sectors, offering tools that enhance efficiency and innovation. However, the emergence of uncensored…

End-to-End Encrypted Texts Between Android and iPhone Are Coming
15
Mar
2025

End-to-End Encrypted Texts Between Android and iPhone Are Coming

Knifings, firebombings, shootings, and murder-for-hire plots—all linked to a splinter group of the 764 crime network called “No Lives Matter.”…

Cisco IOS XR flaw allows attackers to crash BGP process on routers
15
Mar
2025

Cisco IOS XR flaw allows attackers to crash BGP process on routers

Cisco IOS XR flaw allows attackers to crash BGP process on routers Pierluigi Paganini March 15, 2025 Cisco addressed a denial…

Top Cybersecurity Tools of 2025 To Managing Remote Device Threats
15
Mar
2025

Top Cybersecurity Tools of 2025 To Managing Remote Device Threats

The rise of remote work has significantly increased the attack surface for cybercriminals, making robust cybersecurity tools more critical than…

Malicious PyPI Packages
15
Mar
2025

Malicious PyPI Packages Stole Cloud Tokens—Over 14,100 Downloads Before Removal

Mar 15, 2025Ravie Lakshmanan Malware / Supply Chain Security Cybersecurity researchers have warned of a malicious campaign targeting users of…

The Cyber Insurance Conundrum
15
Mar
2025

The Cyber Insurance Conundrum – Cyber Defense Magazine

While cybercriminals innovate at lightning speed, cybersecurity teams—led by Chief Information Security Officers (CISOs)—often find themselves relying on outdated playbooks….