Risk management, legacy tech pose major threats to healthcare firms, report finds
15
Jul
2025

Risk management, legacy tech pose major threats to healthcare firms, report finds

Listen to the article 3 min This audio is auto-generated. Please let us know if you have feedback. Dive Brief:…

How SOC Teams Reduce MTTD And MTTR With Threat Context Enrichment 
15
Jul
2025

How SOC Teams Reduce MTTD And MTTR With Threat Context Enrichment 

Security Operations Centers (SOCs) face a fundamental challenge: distinguishing genuine threats from false positives while maintaining rapid response times. The…

Ransomware Attack on Albemarle County Exposes Residents’ Personal Information
15
Jul
2025

Ransomware Attack on Albemarle County Exposes Residents’ Personal Information

Albemarle County, Virginia, discovered irregularities in its IT infrastructure under a sophisticated ransomware attack. The breach was quickly recognized by…

Newly Emerged GLOBAL GROUP RaaS Expands Operations with AI-Driven Negotiation Tools
15
Jul
2025

Newly Emerged GLOBAL GROUP RaaS Expands Operations with AI-Driven Negotiation Tools

Cybersecurity researchers have shed light on a new ransomware-as-a-service (RaaS) operation called GLOBAL GROUP that has targeted a wide range…

Catastrophic cyber event could cause widespread disruptions to global infrastructure, study suggests
15
Jul
2025

Catastrophic cyber event could cause widespread disruptions to global infrastructure, study suggests

Dive Brief: A global malware attack could infect approximately one-quarter of the world’s computer systems, according to a new report…

Threat Actors Mimic CNN, BBC, and CNBC Websites to Promote Investment Scams
15
Jul
2025

Threat Actors Mimic CNN, BBC, and CNBC Websites to Promote Investment Scams

Cybersecurity researchers have identified a sophisticated international fraud campaign that leverages impersonated news websites from major outlets including CNN, BBC,…

Microsoft Explains How Security Copilot in Intune and Entra Supports Security and IT Teams
15
Jul
2025

Microsoft Explains How Security Copilot in Intune and Entra Supports Security and IT Teams

Microsoft has detailed how its Security Copilot, an AI-powered tool, is transforming security and IT operations by embedding generative AI…

NCSC sets up Vulnerability Research Initiative
15
Jul
2025

NCSC sets up Vulnerability Research Initiative

The UK’s National Cyber Security Centre (NCSC) has lifted the lid on a Vulnerability Research Initiative (VRI) programme designed to…

Konfety Android Malware on Google Play Uses ZIP Manipulation to Imitate Legitimate Apps
15
Jul
2025

Konfety Android Malware on Google Play Uses ZIP Manipulation to Imitate Legitimate Apps

Sophisticated Android malware variant exploits ZIP-level manipulation and dynamic code loading to evade detection while conducting ad fraud operations targeting…

Federal IT Contractor to Pay $14.75M for False Cybersecurity Services Claims
15
Jul
2025

Federal IT Contractor to Pay $14.75M for False Cybersecurity Services Claims

Hill ASC Inc., operating as Hill Associates and based in Rockville, Maryland, has agreed to a multimillion-dollar settlement with the…

GLOBAL GROUP RaaS Operators Enable AI-driven Negotiation Functionality
15
Jul
2025

GLOBAL GROUP RaaS Operators Enable AI-driven Negotiation Functionality

A sophisticated new ransomware-as-a-service operation has emerged with advanced AI-powered negotiation capabilities and mobile management features, targeting organizations across healthcare,…

DShield Honeypot Scanning Hits Record High with Over 1 Million Logs in a Single Day
15
Jul
2025

DShield Honeypot Scanning Hits Record High with Over 1 Million Logs in a Single Day

DShield honeypots have reported previously unheard-of log quantities in a startling increase in cyber reconnaissance activity, with some subnets producing…