Guzman y Gomez continues to deploy Workday as core people platform
05
Aug
2025

Guzman y Gomez continues to deploy Workday as core people platform

Guzman y Gomez Mexican Kitchen is a year into using Workday as the technology foundation for people services, with two…

AI company Perplexity is sneaking to get around blocks on crawlers, Cloudflare alleges
04
Aug
2025

AI company Perplexity is sneaking to get around blocks on crawlers, Cloudflare alleges

Artificial intelligence startup Perplexity is using stealthy techniques to get around network blocks against systematic browsing and scraping of web…

LegalPwn Attack Exploits Gemini, ChatGPT and other AI Tools into Executing Malware
04
Aug
2025

LegalPwn Attack Exploits Gemini, ChatGPT and other AI Tools into Executing Malware

A sophisticated new attack method that exploits AI models’ tendency to comply with legal-sounding text, successfully bypassing safety measures in…

Cybersecurity’s Blind Spot: Why Human Behavior is Every CISO’s Business
04
Aug
2025

Cybersecurity’s Blind Spot: Why Human Behavior is Every CISO’s Business

When a major breach makes headlines, the impact ripples far beyond the individuals whose data has been compromised. It shakes…

CNCERT Accuses U.S. Intelligence of Cyberattacks on Chinese Military-Industrial Targets
04
Aug
2025

CNCERT Accuses U.S. Intelligence of Cyberattacks on Chinese Military-Industrial Targets

China’s National Computer Network Emergency Response Technical Team/Coordination Center (CNCERT) has publicly accused U.S. intelligence agencies of orchestrating sophisticated cyberattacks…

SonicWall VPNs Exploited for 0-Day Vulnerability to Bypass MFA and Deploy Ransomware
04
Aug
2025

SonicWall VPNs Exploited for 0-Day Vulnerability to Bypass MFA and Deploy Ransomware

A likely zero-day vulnerability in SonicWall’s Secure Mobile Access (SMA) VPNs and firewall appliances is being actively exploited in the…

Legacy Solutions Have Become a Cyber Defense Problem
04
Aug
2025

Legacy Solutions Have Become a Cyber Defense Problem

The cyber defense community is at a crossroads that is magnified by cyber criminals’ adoption of AI and ransomware-as-a-service. With…

Modular Malware Suite Sold by Threat Actors Through Public Storefront Domains
04
Aug
2025

Modular Malware Suite Sold by Threat Actors Through Public Storefront Domains

A threat actor operating under the moniker Cyber Products has established a public-facing storefront at cyberproducts[.]io to distribute their modular…

Hackers Abuse Microsoft 365 Direct Send to Deliver Internal Phishing Emails
04
Aug
2025

Hackers Abuse Microsoft 365 Direct Send to Deliver Internal Phishing Emails

A new Proofpoint report reveals how attackers are using Microsoft 365’s Direct Send and unsecured SMTP relays to send internal-looking…

‘Highly evasive’ Vietnamese-speaking hackers stealing data from thousands of victims in 62+ nations
04
Aug
2025

‘Highly evasive’ Vietnamese-speaking hackers stealing data from thousands of victims in 62+ nations

Vietnamese-speaking hackers are carrying out a “highly evasive, multi-stage operation” to steal information from thousands of victims in more than…

Proton Authenticator
04
Aug
2025

Proton fixes Authenticator bug leaking TOTP secrets in logs

Proton fixed a bug in its new Authenticator app for iOS that logged users’ sensitive TOTP secrets in plaintext, potentially exposing…

Claude Vulnerabilities Let Attackers Execute Unauthorized Commands With its Own Help
04
Aug
2025

Claude Vulnerabilities Let Attackers Execute Unauthorized Commands With its Own Help

Two high-severity vulnerabilities in Anthropic’s Claude Code could allow attackers to escape restrictions and execute unauthorized commands. Most remarkably, Claude…