Why organizations are turning to rapid, trustworthy MDR
22
Aug
2025

Why organizations are turning to rapid, trustworthy MDR

How top-tier managed detection and response (MDR) can help organizations stay ahead of increasingly agile and determined adversaries 19 Aug…

Colt Confirms Ransomware Attack Resulted in Customer Data Theft
22
Aug
2025

Colt Confirms Ransomware Attack Resulted in Customer Data Theft

Industrial technology company Colt has confirmed that a recent ransomware attack on its business support systems resulted in the theft…

CISA Warns Of ICS Vulnerabilities In Siemens, Tigo, EG4
22
Aug
2025

CISA Warns Of ICS Vulnerabilities In Siemens, Tigo, EG4

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) have released four new Industrial Control Systems (ICS) advisories. These advisories expose…

U.S. CISA adds Trend Micro Apex One flaw to its Known Exploited Vulnerabilities catalog
22
Aug
2025

U.S. CISA adds Apple iOS, iPadOS, and macOS flaw to its Known Exploited Vulnerabilities catalog

U.S. CISA adds Apple iOS, iPadOS, and macOS flaw to its Known Exploited Vulnerabilities catalog Pierluigi Paganini August 22, 2025 U.S….

‘What happens online stays online’ and other cyberbullying myths, debunked
22
Aug
2025

‘What happens online stays online’ and other cyberbullying myths, debunked

Separating truth from fiction is the first step towards making better parenting decisions. Let’s puncture some of the most common…

AI Systems Can Generate Working Exploits for Published CVEs in 10-15 Minutes
22
Aug
2025

AI Systems Can Generate Working Exploits for Published CVEs in 10-15 Minutes

Artificial intelligence systems can automatically generate functional exploits for newly published Common Vulnerabilities and Exposures (CVEs) in just 10-15 minutes…

NIST Releases New Control Overlays to Manage Cybersecurity Risks in AI Systems
22
Aug
2025

NIST Releases New Control Overlays to Manage Cybersecurity Risks in AI Systems

The National Institute of Standards and Technology (NIST) has unveiled a comprehensive initiative to address the growing cybersecurity challenges associated…

Kill-Switch Malware
22
Aug
2025

Ex-Developer Jailed Four Years for Sabotaging Ohio Employer with Kill-Switch Malware

Aug 22, 2025Ravie LakshmananCybercrime / Malware A 55-year-old Chinese national has been sentenced to four years in prison and three…

22
Aug
2025

14 Million-Download SHA JavaScript Library Exposes Users to Hash Manipulation Attacks

A critical security vulnerability has been discovered in the widely-used sha.js npm package, exposing millions of applications to sophisticated hash…

AI gives ransomware gangs a deadly upgrade
22
Aug
2025

AI gives ransomware gangs a deadly upgrade

Ransomware continues to be the major threat to large and medium-sized businesses, with numerous ransomware gangs abusing AI for automation,…

Windows Docker Desktop Vulnerability Allows Full Host Compromise
22
Aug
2025

Windows Docker Desktop Vulnerability Allows Full Host Compromise

A critical vulnerability in Docker Desktop for Windows has been discovered that allows any container to achieve full host system…

The new battleground for CISOs is human behavior
22
Aug
2025

The new battleground for CISOs is human behavior

Attackers don’t always need a technical flaw. More often, they just trick your people. Social engineering works, and AI makes…