Iranian Hackers Targeting Academics and Foreign Policy Experts Using RMM Tools
06
Nov
2025

Iranian Hackers Targeting Academics and Foreign Policy Experts Using RMM Tools

A previously unidentified Iranian threat actor has emerged with sophisticated social engineering tactics aimed at academics and foreign policy experts…

We need to build psychological readiness into cyber security
06
Nov
2025

We need to build psychological readiness into cyber security

Working in the cyber security industry has always been high-pressure but we have seen that pressure intensify. Advancing threats, expanded…

Cisco became aware of a new attack variant against Secure Firewall ASA and FTD devices
06
Nov
2025

Cisco became aware of a new attack variant against Secure Firewall ASA and FTD devices

Cisco became aware of a new attack variant against Secure Firewall ASA and FTD devices Pierluigi Paganini November 06, 2025…

How a ransomware gang encrypted Nevada government
06
Nov
2025

How a ransomware gang encrypted Nevada government’s systems

The State of Nevada has published an after-action report detailing how hackers breached its systems to deploy ransomware in August,…

Multi-Staged ValleyRAT Uses WeChat and DingTalk to Attack Windows Users
06
Nov
2025

Multi-Staged ValleyRAT Uses WeChat and DingTalk to Attack Windows Users

ValleyRAT has emerged as a sophisticated multi-stage remote access trojan targeting Windows systems, with particular focus on Chinese-language users and…

Computer Weekly’s Women in UK Tech Rising Stars 2025
06
Nov
2025

Computer Weekly’s Women in UK Tech Rising Stars 2025

Role models are everywhere, and while Computer Weekly’s list of the Most Influential Women in UK Tech highlights the women…

Google sounds alarm on self-modifying AI malware
06
Nov
2025

Google sounds alarm on self-modifying AI malware

Google sounds alarm on self-modifying AI malware Pierluigi Paganini November 06, 2025 Google warns malware now uses AI to mutate,…

Threat Actors May Abuse VS Code Extensions to Deploy Ransomware and Use GitHub as C2 Server
06
Nov
2025

Threat Actors May Abuse VS Code Extensions to Deploy Ransomware and Use GitHub as C2 Server

North Korean threat actors are evolving their attack strategies by leveraging developer-focused tools as infection vectors. Recent security discoveries reveal…

Collaboration, founders and entrepreneurs – career path of 2025’s Most Influential Woman in UK Tech
06
Nov
2025

Collaboration, founders and entrepreneurs – career path of 2025’s Most Influential Woman in UK Tech

“I set up a business called Enterprise Lab with two guys I met on Twitter,” says Naomi Timperley, who has…

ClickFix malware attacks evolve with multi-OS support, video tutorials
06
Nov
2025

ClickFix malware attacks evolve with multi-OS support, video tutorials

ClickFix attacks have evolved to feature videos that guide victims through the self-infection process, a timer to pressure targets into…

List of AI Tools Promoted by Threat Actors in Underground Forums and Their Capabilities
06
Nov
2025

List of AI Tools Promoted by Threat Actors in Underground Forums and Their Capabilities

The cybercrime landscape has undergone a dramatic transformation in 2025, with artificial intelligence emerging as a cornerstone technology for malicious…

Airstalk Malware Exploits AirWatch MDM for Covert C2 Communication
06
Nov
2025

Airstalk Malware Exploits AirWatch MDM for Covert C2 Communication

Security researchers have identified a sophisticated new malware family, Airstalk, that exploits VMware’s AirWatch API—now known as Workspace ONE Unified…