Hearing shows broad support for cyber info-sharing law extension
01
Oct
2025

Landmark US cyber information-sharing program expires, bringing uncertainty

Listen to the article 5 min This audio is auto-generated. Please let us know if you have feedback. A federal…

Hackers Posing as Google Careers Recruiter to Steal Gmail Login Details
01
Oct
2025

Hackers Posing as Google Careers Recruiter to Steal Gmail Login Details

A sophisticated phishing campaign has emerged targeting job seekers through fake Google career recruitment opportunities, leveraging social engineering tactics to…

London Court Convicts Chinese Mastermind Behind £5bn Crypto Seizure
01
Oct
2025

London Court Convicts Chinese Mastermind Behind £5bn Crypto Seizure

The mastermind behind one of China’s largest financial frauds has pleaded guilty in a London court, confessing to her role…

CISO's Guide to Securing a Board Seat in the Boardroom
01
Oct
2025

Why Are Cybercriminals Going After Smaller Targets?

With over 20 years of experience, Senthil Ramakrishnan, who leads AT&T’s Cybersecurity Product Strategy, has seen attacks become more and more…

Google Drive for desktop will spot, stop and remedy ransomware damage
01
Oct
2025

Google Drive for desktop will spot, stop and remedy ransomware damage

Google has rolled out AI-powered ransomware detection and file restoration features in Drive for desktop, Google’s official file syncing and…

Breaches Hidden, Attack Surfaces Growing, and AI Misperceptions Rising
01
Oct
2025

Breaches Hidden, Attack Surfaces Growing, and AI Misperceptions Rising

Oct 01, 2025The Hacker NewsAttack Surface / Artificial Intelligence Bitdefender’s 2025 Cybersecurity Assessment Report paints a sobering picture of today’s…

Interview: Wayne Barlow, head of terminals, Bloomberg
01
Oct
2025

Interview: Wayne Barlow, head of terminals, Bloomberg

When Bloomberg’s head of terminals talks about his work in 2024, it sounds like he is referring to a distant…

Chinese hacks US defense contractors
01
Oct
2025

Chinese APT ‘Phantom Taurus’ Targeting Organizations With Net-Star Malware

A Chinese state-sponsored hacking group tracked as ‘Phantom Taurus’ has been targeting government and telecommunications organizations for espionage for more…

Federal cuts force many state and local governments out of cyber collaboration group
01
Oct
2025

Federal cuts force many state and local governments out of cyber collaboration group

Listen to the article 11 min This audio is auto-generated. Please let us know if you have feedback. Federal funding…

Patchwork APT Using PowerShell Commands to Create Scheduled Task and Downloads Final Payload
01
Oct
2025

Patchwork APT Using PowerShell Commands to Create Scheduled Task and Downloads Final Payload

Since mid-2025, cybersecurity researchers have tracked a resurgence of Patchwork Advanced Persistent Threat (APT) campaigns targeting government and telecommunications sectors…

Quantum Resistance and Coding for a Post-Quantum Bitcoin
01
Oct
2025

Quantum Resistance and Coding for a Post-Quantum Bitcoin

Bitcoin was created with strong cryptography, based on mathematical problems so complex that even the most powerful computers struggle to…

Fuel iX Fortify helps enterprises expose GenAI vulnerabilities at scale
01
Oct
2025

Fuel iX Fortify helps enterprises expose GenAI vulnerabilities at scale

TELUS Digital has released its continuous automated red-teaming application, Fuel iX Fortify. The solution helps enterprises test GenAI systems at…