NIST releases Second Public Draft for Supply Chain Traceability
01
Aug
2025

NIST releases Second Public Draft for Supply Chain Traceability

The NIST National Cybersecurity Center of Excellence (NCCoE) has released a second public draft of NIST Internal Report 8536, Supply Chain…

Unit 42 Unveils Attribution Framework to Classify Threat Actors Based on Activity
01
Aug
2025

Unit 42 Unveils Attribution Framework to Classify Threat Actors Based on Activity

Palo Alto Networks’ Unit 42 threat research team has introduced a groundbreaking systematic approach to threat actor attribution, addressing longstanding…

Security learnings from developing the NCCoE Chatbot
01
Aug
2025

Security learnings from developing the NCCoE Chatbot

The NIST National Cybersecurity Center of Excellence (NCCoE) has re-issued NIST Internal Report (IR) 8579, Developing the NCCoE Chatbot: Technical and…

Threat Actors Embed Malicious RMM Tools to Gain Silent Initial Access to Organizations
01
Aug
2025

Threat Actors Embed Malicious RMM Tools to Gain Silent Initial Access to Organizations

A sophisticated cyber campaign leveraging legitimate Remote Monitoring and Management (RMM) tools has emerged as a significant threat to European…

Navigating APTs - Singapore’s Cautious Response to State-Linked Cyber Attacks
01
Aug
2025

Navigating APTs – Singapore’s Cautious Response to State-Linked Cyber Attacks

Singapore’s cybersecurity landscape faced a significant challenge in July 2025 when Coordinating Minister K. Shanmugam disclosed that the nation was…

Anubis Ransomware Attacking Android and Windows Users to Encrypt Files and Steal Login Credentials
01
Aug
2025

Anubis Ransomware Attacking Android and Windows Users to Encrypt Files and Steal Login Credentials

A sophisticated new ransomware threat has emerged from the cybercriminal underground, targeting both Android and Windows platforms with dual capabilities…

New account hijacking defences for Google Workspace and Chrome
01
Aug
2025

New account hijacking defences for Google Workspace and Chrome

Google has released a series of technological measures to mitigate phishing and credential theft attacks, which the technology giant said…

New Banking Malware DoubleTrouble Attacking Users Via Phishing Sites To Steal Banking Credentials
01
Aug
2025

New Banking Malware DoubleTrouble Attacking Users Via Phishing Sites To Steal Banking Credentials

A sophisticated new banking trojan dubbed DoubleTrouble has emerged as a significant threat to mobile users across Europe, employing advanced…

Quantum computing, AI stocks rise as Nvidia kicks off annual conference
01
Aug
2025

Nvidia says its chips have no ‘backdoors’

Nvidia said its products have no “backdoors” that would allow remote access or control after China raised concerns over potential…

NOVABLIGHT as Educational Tool Attacking Users to Steal Login Credentials and Compromise Wallets
01
Aug
2025

NOVABLIGHT as Educational Tool Attacking Users to Steal Login Credentials and Compromise Wallets

A sophisticated new threat has emerged in the cybercriminal landscape, masquerading as an educational tool while orchestrating large-scale credential theft…

Veterans' Affairs tests using AI to tackle 82,645 unprocessed claims
01
Aug
2025

Veterans’ Affairs tests using AI to tackle 82,645 unprocessed claims

The Department of Veterans’ Affairs (DVA) is preparing to pilot artificial intelligence to help manage a growing caseload of 82,645…

Chinese Silk Typhoon Hackers Filed 10+ Patents for Highly Intrusive Hacking Tools
01
Aug
2025

Chinese Silk Typhoon Hackers Filed 10+ Patents for Highly Intrusive Hacking Tools

Chinese state-sponsored hackers associated with the notorious Silk Typhoon group have filed over ten patents for sophisticated cyber espionage tools,…