In recent weeks, security analysts have observed a new wave of macOS attacks leveraging legitimately issued Extended Validation (EV) certificates…
WestJet Airlines has confirmed that a recent cybersecurity incident exposed certain personal information belonging to its customers. The Canadian carrier…
Oct 01, 2025Ravie LakshmananEncryption / Hardware Security In yet another piece of research, academics from Georgia Institute of Technology and…
The US Cybersecurity and Information Sharing Act (CISA) of 2015 has expired with no replacement or extension in place amid…
F-Droid is warning that the project could reach an end due to Google’s new requirements for all Android developers to…
A sophisticated DNS-based malware campaign has emerged, utilizing thousands of compromised websites worldwide to deliver the Strela Stealer information-stealing malware…
JFrog’s security research team has identified a malicious PyPI package named SoopSocks that masquerades as a legitimate SOCKS5 proxy utility…
Later this month, Microsoft will start automatically installing the Microsoft 365 companion apps on Windows 11 devices that have the…
Google has introduced a new AI-powered ransomware detection feature for Google Drive for desktop, designed to block cyberattacks and protect…
In August 2025, Australian authorities issued multiple scam alerts after users reported suspicious Facebook groups promoting “active senior trips.” What…
A new trend lately observed in the world of cybercrime is the demand for user-friendly, plug-and-play tools that make it…
For years, microsegmentation has carried a reputation for being too complex, too manual, or too advanced for most organizations. In fairness, legacy…











