Threat Actors Personalize Phishing Attacks With Advanced Tactics for Malware Delivery
15
Aug
2025

Threat Actors Personalize Phishing Attacks With Advanced Tactics for Malware Delivery

Cybercriminals are increasingly leveraging personalization tactics to enhance the effectiveness of their malware-delivery phishing campaigns, with threat actors customizing subject…

NIST Releases Control Overlays for Securing AI Systems Concept Paper
15
Aug
2025

NIST Releases Control Overlays for Securing AI Systems Concept Paper

NIST has released a concept paper and proposed action plan for developing a series of NIST SP 800-53 Control Overlays for Securing…

Canada’s second-largest airline WestJet is containing a cyberattack
15
Aug
2025

Hackers exploit Microsoft flaw to breach Canada ’s House of Commons

Hackers exploit Microsoft flaw to breach Canada ’s House of Commons Pierluigi Paganini August 15, 2025 Hackers breached Canada ’s…

As Agentic AI Gains Traction – Enterprises Anticipate Heightened Risks
15
Aug
2025

As Agentic AI Gains Traction – Enterprises Anticipate Heightened Risks

With 95% of enterprises facing incidents, Infosys research reveals a wide gap between AI adoption and responsible AI readiness, exposing…

Qilin Ransomware Leads The Attack Landscape With 70+ Claimed Victims in July
15
Aug
2025

Qilin Ransomware Leads The Attack Landscape With 70+ Claimed Victims in July

The ransomware threat landscape witnessed a concerning surge in July 2025, with the Qilin ransomware group maintaining its dominant position…

15
Aug
2025

Stop Judging AI Using Standards You Don’t Apply to Humans

I know AI is stupid because it can’t count the b’s in “blueberry” the same way I know Einstein was…

New EncryptHub Campaign Leverages Brave Support Platform to Deliver Malicious Payloads via MMC Vulnerability
15
Aug
2025

New EncryptHub Campaign Leverages Brave Support Platform to Deliver Malicious Payloads via MMC Vulnerability

The cyberthreat landscape continues to evolve as malicious actors develop increasingly sophisticated attack methods, with the EncryptHub threat group emerging…

New FireWood Malware Attacking Linux Systems to Execute Commands and Exfiltrate Sensitive Data
15
Aug
2025

New FireWood Malware Attacking Linux Systems to Execute Commands and Exfiltrate Sensitive Data

A sophisticated new variant of the FireWood backdoor has emerged, targeting Linux systems with enhanced evasion capabilities and streamlined command…

"BitUnlocker" full-volume encryption bypass found by Microsoft researchers
15
Aug
2025

“BitUnlocker” full-volume encryption bypass found by Microsoft researchers

Microsoft’s own security researchers uncovered a set of of vulnerabilities in the Windows Recovery Environment (WinRE), one of which could…

Suncorp deploys Duck Creek at AAMI
15
Aug
2025

Suncorp deploys Duck Creek at AAMI

Suncorp is “deep in delivery” of a new policy administration system in its AAMI brand in Australia, having first deployed…

Treasury slaps sanctions on people, companies tied to North Korean IT worker schemes
15
Aug
2025

US widens sanctions on Russian crypto exchange Garantex, its successor and affiliate firms

U.S. officials imposed sanctions Thursday on Russian cryptocurrency exchange Garantex, its successor Grinex, and related affiliates, while also targeting its…

Ransomware Actors Combine Legitimate Tools with Custom Malware to Evade Detection
15
Aug
2025

Ransomware Actors Combine Legitimate Tools with Custom Malware to Evade Detection

Operators behind the Crypto24 strain are employing highly coordinated, multi-stage attacks that blend legitimate system tools with bespoke malware to…