Ransomware claims dipped slightly in 2024, cyber insurer says
20
Aug
2025

Pharmaceutical firm Inotiv investigating ransomware attack that disrupted operations

The pharmaceutical and biotechnology company Inotiv Inc. is investigating a cyberattack that led to hackers encrypting the firm’s data, it…

Threat actors abuse Google Apps Script in evasive phishing attacks
20
Aug
2025

Why email security needs its EDR moment to move beyond prevention

Security leaders today are rethinking email security, not because traditional methods have failed outright, but because the threat landscape and…

A Free Zero Trust Web Application Firewall for 2026
20
Aug
2025

A Free Zero Trust Web Application Firewall for 2026

Every type of organization—whether it’s a multinational giant with thousands of employees or a single tech enthusiast running a homelab—needs…

Phone Searches at the US Border Hit a Record High
20
Aug
2025

Phone Searches at the US Border Hit a Record High

United States Custom and Border Protection officials have sweeping powers to search anyone’s phone when they are entering the country—including…

Threat Actors Exploit GenAI Platforms to Craft Sophisticated and Realistic Phishing Attacks
20
Aug
2025

Threat Actors Exploit GenAI Platforms to Craft Sophisticated and Realistic Phishing Attacks

The proliferation of generative AI (GenAI) platforms has revolutionized web-based services, enabling rapid code assistance, natural language processing, chatbot deployment,…

Dutch cloud pioneers face the hard limits of digital sovereignty
20
Aug
2025

Jack of all managed security services, or master of none?

If you crank up the Wayback Machine and load the websites of today’s biggest managed security service providers (MSSPs), you’ll…

fancy bear phishing email
20
Aug
2025

Russian cyber group exploits seven-year-old network vulnerabilities for long-term espionage

A Russian state-sponsored espionage group has been systematically compromising network devices worldwide for over a decade, exploiting a seven-year-old vulnerability…

Hackers steal Microsoft logins using legitimate ADFS redirects
20
Aug
2025

Hackers steal Microsoft logins using legitimate ADFS redirects

Hackers are using a novel technique that combines legitimate office.com links with Active Directory Federation Services (ADFS) to redirect users to…

Link11 Highlights Growing Cybersecurity Risks and Introduces Integrated WAAP Protection Platform
20
Aug
2025

Link11 Highlights Growing Cybersecurity Risks and Introduces Integrated WAAP Protection Platform

Link11, a Germany-based global IT security provider, has released insights into the evolving cybersecurity threat landscape and announced the capabilities…

Kubernetes Capsule Vulnerability Enables Attackers to Inject Arbitrary Labels
20
Aug
2025

Kubernetes Capsule Vulnerability Enables Attackers to Inject Arbitrary Labels

Security researchers have disclosed a critical vulnerability in Kubernetes Capsule v0.10.3 and earlier versions that allows authenticated tenant users to…

Fake Antivirus App Spreads Android Malware to Spy on Russian Users
20
Aug
2025

Fake Antivirus App Spreads Android Malware to Spy on Russian Users

Doctor Web warns of Android.Backdoor.916.origin, a fake antivirus app that spies on Russian users by stealing data, streaming audio and…

Comet AI Browser
20
Aug
2025

Experts Find AI Browsers Can Be Tricked by PromptFix Exploit to Run Malicious Hidden Prompts

Cybersecurity researchers have demonstrated a new prompt injection technique called PromptFix that tricks a generative artificial intelligence (GenAI) model into…