Princeton University Data Breach - Database with Donor Info Compromised
18
Nov
2025

Princeton University Data Breach – Database with Donor Info Compromised

Princeton University faced a security incident on November 10, 2025, when outside attackers gained unauthorized access to a database managed…

Lazarus APT Group's New ScoringMathTea RAT Enhances Remote Command Execution and More
18
Nov
2025

Lazarus APT Group’s New ScoringMathTea RAT Enhances Remote Command Execution and More

The Lazarus APT Group, an advanced persistent threat (APT) attributed to North Korea, has deployed a sophisticated new Remote Access…

Kentik AI Advisor brings intelligence and automation to network design and operations
18
Nov
2025

Kentik AI Advisor brings intelligence and automation to network design and operations

Kentik has launched the Kentik AI Advisor, an agentic AI solution that understands enterprise and service provider networks, thinks critically,…

Seven npm Packages Use Adspect Cloaking to Trick Victims Into Crypto Scam Pages
18
Nov
2025

Seven npm Packages Use Adspect Cloaking to Trick Victims Into Crypto Scam Pages

Cybersecurity researchers have discovered a set of seven npm packages published by a single threat actor that leverages a cloaking…

One year on from the CrowdStrike outage: What have we learned?
18
Nov
2025

CCS under fire over ‘anti-SME’ supplier requirements for G-Cloud 15

The Crown Commercial Service (CCS) stands accused of making parts of its flagship cloud computing framework, G-Cloud, inaccessible to small…

Hackers increasingly target operational technology, with manufacturing sector bearing the brunt
18
Nov
2025

Hackers increasingly target operational technology, with manufacturing sector bearing the brunt

Listen to the article 4 min This audio is auto-generated. Please let us know if you have feedback. Dive Brief:…

A Simple WhatsApp Security Flaw Exposed 3.5 Billion Phone Numbers
18
Nov
2025

A Simple WhatsApp Security Flaw Exposed 3.5 Billion Phone Numbers

WhatsApp’s mass adoption stems in part from how easy it is to find a new contact on the messaging platform:…

The Cybersecurity Path Forward for Airlines
18
Nov
2025

The Cybersecurity Path Forward for Airlines

Staff resorted to handwritten boarding passes. Flights were canceled. Queues stretched through terminals. Manual processes couldn’t handle the volume. The…

Beyond IAM Silos: Why the Identity Security Fabric is Essential for Securing AI and Non-Human Identities
18
Nov
2025

Beyond IAM Silos: Why the Identity Security Fabric is Essential for Securing AI and Non-Human Identities

Identity security fabric (ISF) is a unified architectural framework that brings together disparate identity capabilities. Through ISF, identity governance and…

NHS signs another major IT deal with the Indian IT sector
18
Nov
2025

NHS signs another major IT deal with the Indian IT sector

The NHS’s supply chain operation has contracted India-headquartered Tata Consultancy Services (TCS) to transform IT in a further sign that…

The Chinese national flag is raised at the Chinese embassy in London. MI5 warned that Chinese spies were using LinkedIn to target UK politicians, posing an espionage risk for Westminster. Photo: AP
18
Nov
2025

MI5 warns Chinese spies are targeting UK lawmakers on LinkedIn

Britain’s domestic intelligence agency on Tuesday warned lawmakers that Chinese spies were “actively” reaching out to them via recruitment headhunters….

Learn How Leading Companies Secure Cloud Workloads and Infrastructure at Scale
18
Nov
2025

Learn How Leading Companies Secure Cloud Workloads and Infrastructure at Scale

You’ve probably already moved some of your business to the cloud—or you’re planning to. That’s a smart move. It helps…