Ukraine's largest bank PrivatBank Targeted with SmokeLoader malware
06
Feb
2025

Ukraine’s largest bank PrivatBank Targeted with SmokeLoader malware

UAC-0006, a financially motivated threat actor, targets PrivatBank customers with advanced phishing attacks. CloudSEK’s research reveals malicious emails containing password-protected…

Cybersecurity Leadership
06
Feb
2025

The Evolving Role of PAM in Cybersecurity Leadership Agendas for 2025

Privileged Access Management (PAM) has emerged as a cornerstone of modern cybersecurity strategies, shifting from a technical necessity to a…

Swedish commission delivers roadmap to drive artificial intelligence reforms
06
Feb
2025

Swedish commission delivers roadmap to drive artificial intelligence reforms

Sweden is poised to regain its status as the frontier Nordic nation for next-generation technology development, following the government’s endorsement…

A Step-by-Step Guide to the NIST Risk Management Framework (RMF): Simplifying Risk Management for Small Enterprises
06
Feb
2025

A Step-by-Step Guide to the NIST Risk Management Framework (RMF): Simplifying Risk Management for Small Enterprises

As the decade nears its halfway mark, ransomware attacks continue to dominate headlines across newspapers and website homepages. The relentless uptick in attacks shows…

Authorities Arrested Hacker Who Compromised 40+ Organizations
06
Feb
2025

Authorities Arrested Hacker Who Compromised 40+ Organizations

Spanish authorities have arrested a hacker believed to be responsible for cyberattacks targeting over 40 public and private organizations globally….

SparkCat Malware
06
Feb
2025

SparkCat Malware Uses OCR to Extract Crypto Wallet Recovery Phrases from Images

A new malware campaign dubbed SparkCat has leveraged a suit of bogus apps on both Apple’s and Google’s respective app…

Five Eyes Agencies Release Guidance on Securing Edge Devices
06
Feb
2025

Five Eyes Agencies Release Guidance on Securing Edge Devices

Government agencies from the Five Eyes countries have released joint guidance for device manufacturers to secure their edge products against…

Integrating AI into Network Security for Improved Threat Detection
06
Feb
2025

Integrating AI into Network Security for Improved Threat Detection

Have you ever wondered how your digital security can keep up with the lightning-fast evolution of cyber threats? The world…

Beware of Lazarus LinkedIn Recruiting Scam Targeting Org’s to Deliver Malware
06
Feb
2025

Beware of Lazarus LinkedIn Recruiting Scam Targeting Org’s to Deliver Malware

A new wave of cyberattacks orchestrated by the North Korea-linked Lazarus Group has been identified, leveraging fake LinkedIn job offers…

OpenAI Data Breach - Threat Actor Allegedly Claims 20 Million Logins for Sale
06
Feb
2025

OpenAI Data Breach – Threat Actor Allegedly Claims 20 Million Logins for Sale

OpenAI may have become the latest high-profile target of a significant data breach. A threat actor has surfaced on underground…

Lumma Stealer Attacking Windows Users In India With Fake Captcha Pages
06
Feb
2025

Lumma Stealer Attacking Windows Users In India With Fake Captcha Pages

Cybersecurity experts are raising alarms over a new wave of attacks targeting Windows users in India, driven by the Lumma…

Top 3 Ransomware Threats Active in 2025
06
Feb
2025

Top 3 Ransomware Threats Active in 2025

You arrive at the office, power up your system, and panic sets in. Every file is locked, and every system…