Maryland Transportation Systems Disrupted Following Cyberattack
26
Aug
2025

Maryland Transportation Systems Disrupted Following Cyberattack

Maryland’s transit network experienced widespread disruption this week after a sophisticated cyberattack targeted critical information systems, forcing the Maryland Transit…

Social media algorithms exposing children to violent pornographic content, report shows
26
Aug
2025

Social media algorithms exposing children to violent pornographic content, report shows

Social media algorithms are pushing unsolicited pornographic content into children’s feeds, according to a report by the Children’s Commissioner. The…

Malicious Bing Ads deploy Weaponized PuTTY to Exploit Kerberos and Attack Active Directory services
26
Aug
2025

Malicious Bing Ads deploy Weaponized PuTTY to Exploit Kerberos and Attack Active Directory services

A malvertising campaign using sponsored results on Microsoft’s search platform delivered a weaponized PuTTY that established persistence, enabled hands-on keyboard…

X/Twitter Found to Be Most Aggressive Social Media App in Tracking User Location Data
26
Aug
2025

X/Twitter Found to Be Most Aggressive Social Media App in Tracking User Location Data

A comprehensive study examining the location data practices of the top 10 social media platforms has uncovered concerning patterns of…

Dartmouth College’s infrastructure head on solving the VMware puzzle and serving Ivy League needs
26
Aug
2025

Dartmouth College’s infrastructure head on solving the VMware puzzle and serving Ivy League needs

Ty Peavey is a proud man – not proud as in ‘arrogant’, but he can rightly pat himself on the…

Threat Actors Adapting Android Droppers Even to Deploy Simple Malware to Stay Future-Proof
26
Aug
2025

Threat Actors Adapting Android Droppers Even to Deploy Simple Malware to Stay Future-Proof

Android droppers have evolved from niche installers for heavyweight banking Trojans into universal delivery frameworks, capable of deploying even rudimentary…

CISA Adds Three Exploited Vulnerabilities to KEV Catalog Affecting Citrix and Git
26
Aug
2025

CISA Adds Three Exploited Vulnerabilities to KEV Catalog Affecting Citrix and Git

Aug 26, 2025Ravie LakshmananVulnerability / Data Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added three security…

Why digital transformation has a physical address
26
Aug
2025

Why digital transformation has a physical address

For the better part of a decade, digital transformation has been discussed in terms of apps, data and cloud platforms….

Chinese UNC6384 Hackers Leverages Valid Code Signing Certificates to Evade Detection
26
Aug
2025

Chinese UNC6384 Hackers Leverages Valid Code Signing Certificates to Evade Detection

A stealthy espionage campaign emerged in early 2025 targeting diplomats and government entities in Southeast Asia and beyond. At the…

Google to Verify All Android Developers in 4 Countries to Block Malicious Apps
26
Aug
2025

Google to Verify All Android Developers in 4 Countries to Block Malicious Apps

Aug 26, 2025Ravie LakshmananMobile Security / Data Privacy Google has announced plans to begin verifying the identity of all developers…

French Retailer Auchan Hit by Cyberattack, Customer Data Compromised
26
Aug
2025

French Retailer Auchan Hit by Cyberattack, Customer Data Compromised

French retail giant Auchan announced on August 21 that it fell victim to a cyberattack that resulted in the theft of loyalty…

Protecting farms from hackers: A Q&A with John Deere's Deputy CISO
26
Aug
2025

Protecting farms from hackers: A Q&A with John Deere’s Deputy CISO

Agriculture is a connected, software-driven industry where cybersecurity is just as essential as tractors and harvesters. From embedded hardware in…