North Korean Hackers Weaponized 67 Malicious npm Packages to Deliver XORIndex Malware
16
Jul
2025

North Korean Hackers Weaponized 67 Malicious npm Packages to Deliver XORIndex Malware

North Korean threat actors have escalated their software supply chain attacks with the deployment of 67 malicious npm packages that…

Most cybersecurity risk comes from just 10% of employees
16
Jul
2025

Most cybersecurity risk comes from just 10% of employees

A new report from Living Security and the Cyentia Institute sheds light on the real human element behind cybersecurity threats,…

Telstra warns network upgrade funds being eaten up by compliance costs
16
Jul
2025

Telstra warns network upgrade funds being eaten up by compliance costs

Telstra has warned escalating compliance costs are eating into funds better spent on network upgrades. The telco cites two recent…

The MSP Customer Insight Report 2025
16
Jul
2025

The MSP Customer Insight Report 2025

The MSP Customer Insight Report 2025 reveals organisations are now relying on MSPs and channel partners not just for technical…

Hacktivist Groups Attacks on Critical ICS Systems to Steal Sensitive Data
16
Jul
2025

Hacktivist Groups Attacks on Critical ICS Systems to Steal Sensitive Data

The cybersecurity landscape has witnessed an alarming evolution in hacktivist operations, with threat actors increasingly shifting their focus from traditional…

Google's Big Sleep security AI agent foils bug exploitation
16
Jul
2025

Google’s Big Sleep security AI agent foils bug exploitation

Google has used a security-specific AI agent to detect a second critical vulnerability that was on the radar of threat…

Cybersecurity Risks of Portable Storage Media in OT Environments
16
Jul
2025

Cybersecurity Risks of Portable Storage Media in OT Environments

The NIST National Cybersecurity Center of Excellence has developed the draft NIST Special Publication (SP) 1334, Reducing the Cybersecurity Risks of Portable…

U.S. CISA adds Citrix NetScaler ADC and Gateway flaw to its Known Exploited Vulnerabilities catalog
16
Jul
2025

U.S. CISA adds Wing FTP Server flaw to its Known Exploited Vulnerabilities catalog

U.S. CISA adds Wing FTP Server flaw to its Known Exploited Vulnerabilities catalog Pierluigi Paganini July 16, 2025 U.S. Cybersecurity and…

Former Army soldier pleads guilty to widespread attack spree linked to AT&T, Snowflake and others
16
Jul
2025

Former Army soldier pleads guilty to widespread attack spree linked to AT&T, Snowflake and others

A 21-year-old former Army soldier pleaded guilty Tuesday to charges stemming from a series of attacks and extortion attempts last…

North Korean Hackers Using Fake Zoom Invites to Attack Crypto Startups
16
Jul
2025

North Korean Hackers Using Fake Zoom Invites to Attack Crypto Startups

North Korean threat actors have escalated their sophisticated cyber operations against cryptocurrency startups, deploying an evolved malware campaign that leverages…

Fake Telegram Apps Spread via 607 Domains in Large-Scale Android Malware Campaign
16
Jul
2025

Fake Telegram Apps Spread via 607 Domains in New Android Malware Attack

A new threat campaign is tricking Android users into downloading fake Telegram apps from hundreds of malicious domains, according to…

Hungry Jack's stands up Workday for its 30,000 people
16
Jul
2025

Hungry Jack’s stands up Workday for its 30,000 people

Hungry Jack’s is standing up its first integrated HR system on Workday in four phases to better support its people…