AI Revolutionizes PLA Military Intelligence with Rapid Deployment Across Operations
18
Jun
2025

AI Revolutionizes PLA Military Intelligence with Rapid Deployment Across Operations

The People’s Liberation Army (PLA) of China has adopted generative artificial intelligence (AI) to revolutionize its intelligence capabilities, marking a…

GodFather Android Malware Runs Real Apps in a Sandbox to Steal Data
18
Jun
2025

GodFather Android Malware Runs Real Apps in a Sandbox to Steal Data

Cybersecurity researchers at Zimperium zLabs, led by Fernando Ortega and Vishnu Pratapagiri, have uncovered a dangerous new version of the…

5 New Trends In Phishing Attacks On Businesses 
18
Jun
2025

5 New Trends In Phishing Attacks On Businesses 

Phishing remains one of the most effective ways attackers infiltrate corporate environments. Today’s phishing campaigns are no longer just poorly…

Chollima Hackers Target Windows and MacOS with New GolangGhost RAT Malware
18
Jun
2025

Chollima Hackers Target Windows and MacOS with New GolangGhost RAT Malware

A North Korean-affiliated threat actor called Famous Chollima (also known as Wagemole) has launched a sophisticated remote access trojan (RAT)…

New SuperCard Malware Using Hacked Android Phones to Relay Data from Users Payment Cards to Attackers Device
18
Jun
2025

New SuperCard Malware Using Hacked Android Phones to Relay Data from Users Payment Cards to Attackers Device

In a concerning development for mobile payment security, cybersecurity experts have identified a sophisticated new malware strain named “SuperCard” that…

Publisher’s Spotlight: NAKIVO Backup & Replication v11
18
Jun
2025

Publisher’s Spotlight: NAKIVO Backup & Replication v11

A Powerful, All-in-One Solution for Cyber-Resilient Backup and Recovery In an era where ransomware, cloud complexity, and regulatory pressures are…

The Strategic Use of Private Companies and Hacktivists in Cyber Operations
18
Jun
2025

The Strategic Use of Private Companies and Hacktivists in Cyber Operations

Russia’s sophisticated cyber warfare strategy emerges as a calculated blend of state power and non-state agility, leveraging private companies, hacktivists,…

Iranian flag waving with cityscape on background in Tehran, Iran. (Sir Francis Canker Photography/Getty Images)
18
Jun
2025

Iran’s financial sector takes another hit as largest crypto exchange is targeted

Cyberattacks targeting Iran’s financial sector widened Wednesday, as a pro-Israel hacktivist group stole more than $90 million from Nobitex, the…

18
Jun
2025

Instagram ads mimicking BMO, EQ Banks are finance scams

Instagram ads impersonating financial institutions like Bank of Montreal (BMO) and EQ Bank (Equitable Bank) are being used to target…

Halo Security Honored with 2025 MSP Today Product of the Year Award
18
Jun
2025

Halo Security Honored with 2025 MSP Today Product of the Year Award

Halo Security’s Attack Surface Management Platform Honored for Exceptional Innovation and Successful Deployment Through The Channel Halo Security today announced that…

Halo Security Honored with 2025 MSP Today Product of the Year Award
18
Jun
2025

Halo Security Honored with 2025 MSP Today Product of the Year Award

Halo Security’s Attack Surface Management Platform Honored for Exceptional Innovation and Successful Deployment Through The Channel Halo Security today announced that…

AgentSmith Flaw in LangSmith's Prompt Hub Exposed User API Keys, Data
18
Jun
2025

AgentSmith Flaw in LangSmith’s Prompt Hub Exposed User API Keys, Data

Cybersecurity researchers at Noma Security have disclosed details of a critical vulnerability within LangChain‘s LangSmith platform, specifically affecting its public…