Articles by Tag #cybersecuritynews

Browse our collection of articles on various topics related to IT technologies. Dive in and explore something new!

Top 5 Strategies to Protect Against the Growing Robocall Cyber Threat

Robocall scams have escalated in sophistication and danger. A recent case involving the VoIP...

Learn More 0 0Feb 17

Securing Your Software Supply Chain: A Critical Leadership Responsibility Against Growing Cyber Threats

More than half of large UK financial services firms experienced at least one third-party supply...

Learn More 0 0Feb 17

The Rising Threat of 'Quishing': Understanding QR Code Phishing Attacks

QR codes have become ubiquitous, facilitating digital interactions. However, their prevalence has...

Learn More 0 0Feb 17

Ransomware Criminals Exploit Microsoft Teams for Vishing Scams Against Organizations

Cybersecurity threats are becoming increasingly sophisticated in today's digital landscape "Stay...

Learn More 0 0Feb 16

Judges Consider Managing Their Own Security Force Due to Rising Threats

Members of the federal judiciary are increasingly concerned for their safety as they face...

Learn More 0 0Jun 19

Earth Preta APT Exploit Microsoft Utility Tool & Bypass AV Detection to Control Windows

Researchers from Trend Micro’s Threat Hunting team have uncovered a sophisticated cyberattack...

Learn More 0 0Feb 19

Critical AnyDesk Vulnerability Exploited by Hackers for Unauthorized Admin Access

Identified as CVE-2024-12754 and tracked under ZDI-24-1711, this vulnerability allows local...

Learn More 0 0Feb 17

Malicious ML Models on Hugging Face Exploit Broken Pickle Format

In a recent discovery, cybersecurity researchers have found two malicious machine learning (ML)...

Learn More 0 0Feb 17

XCSSET Malware: New Zero-Day Attacks Target macOS Users via Xcode Projects

Microsoft Threat Intelligence has identified an evolved iteration of the XCSSET malware family...

Learn More 0 0Feb 19

Burp Suite Goes AI: Revolutionizing Web Pentesting

PortSwigger, the company behind Burp Suite, is revolutionizing web application security testing by...

Learn More 0 0Feb 17

Can AI Mitigate Insider Threats? Exploring the Existential Risks

As global powers incorporate artificial intelligence into their militaries, the United States...

Learn More 0 0Feb 16

Rep. Langworthy Proposes Bill to Update Northern Border

House Republican Leadership Chairwoman Elise Stefanik joined Rep. Pete Stauber (R-MN) and Rep. Nick...

Learn More 0 0Jun 18

Building a Cybersecurity Content Strategy That Converts

How to Engage CISOs, CEOs, and Everyone In Between 83% of cybersecurity deals stall...

Learn More 0 0Feb 17

Tricking AI into Creating Malware

AI tools like ChatGPT and Copilot are designed with safety measures to prevent misuse, but recent...

Learn More 0 0Jun 19

New PAN-OS Authentication Bypass Vulnerability Exploited by Hackers

Alto Networks has released a patch for a high-severity authentication bypass vulnerability,...

Learn More 0 0Feb 17

DeepSeek App Under Scrutiny: Safety Concerns and Data Storage Issues

According to DeepSeek's privacy policy, the service collects extensive user data, including chat...

Learn More 0 0Feb 17

Massive Brute Force Attack Utilizes 2.8 Million IPs to Compromise VPN and Firewall Logins

A global brute force attack campaign leveraging 2.8 million IP addresses actively targets edge...

Learn More 0 0Feb 17

RansomHub: A New Ransomware Threat Targeting Windows, ESXi, Linux, and FreeBSD Systems

The RansomHub ransomware group has emerged as one of the most prolific cybercrime syndicates of...

Learn More 0 0Feb 19

China's Quantum Strategy: Launching Quantum-Resistant Encryption Standards and Protecting Data from Emerging Threats

China has initiated a global effort to develop post-quantum cryptographic algorithms, diverging...

Learn More 0 0Feb 19

3,000 Leaked ASP.NET Keys Exposing IIS Servers to Code Injection Attacks

Key Insights: Microsoft's Threat Intelligence team has identified over 3,000 publicly...

Learn More 0 0Feb 17

Fastly Research Insights on Cyberattacks and Bot Traffic

Fastly’s Q1 2025 Threat Insights Report highlights a significant rise in cyberattacks targeting the...

Learn More 0 0Jun 19

Urgent Warning for Gmail and Outlook Users: Beware of Dangerous Emails and New Scams

Gmail users have been warned about sophisticated scams that utilize AI to steal personal...

Learn More 0 0Feb 19

Nova Scotia Power's Cybersecurity Initiative

Nova Scotia Power has received approval for a $1.8 million cybersecurity project following a...

Learn More 0 0Jun 18