12 Aug

Supply-chain dependencies: Check your resilience blind spot

Business Security Does your business truly understand its dependencies, and how to mitigate the risks posed by an attack on them? Tony Anscombe 12 Aug

Author rabih
12 Aug

Oh, great.Three notorious cybercrime gangs appear to be collaborating

Prolific cybercrime collectives Scattered Spider, ShinyHunters, and Lapsus$ appear to have come together in a new Telegram channel that shares news of their exploits. The

Author rabih
12 Aug

Hyundai: Want cyber-secure car locks? That’ll be £49, please

Hyundai is charging UK customers £49 ($66) for a security upgrade to prevent thieves from bypassing its car locks. The offer is available to Ioniq

Author rabih
12 Aug

How the always-on generation can level up its cybersecurity game

Kids Online Digital natives are comfortable with technology, but may be more exposed to online scams and other threats than they think Phil Muncaster 12

Author rabih
12 Aug

The White House could end UK’s decade-long fight to bust encryption

Analysis The Home Office’s war on encryption – its most technically complex and controversial aspect of modern policymaking yet – is starting to look like

Author rabih
12 Aug

Poisoned telemetry can turn AIOps into AI Oops, researchers show

Automating IT operations using AI may not be the best idea at the moment. Researchers with RSAC Labs and George Mason University say that AI

Author rabih
11 Aug

Russia’s RomCom among those exploiting a WinRAR 0-day in highly-targeted attacks

Russia-linked attackers found and exploited a high-severity WinRAR vulnerability before the maintainers of the Windows file archiver issued a fix. The bug, tracked as CVE-2025-8088,

Author rabih
11 Aug

WinRAR zero-day exploited in espionage attacks against high-value targets

The attacks used spearphishing campaigns to target financial, manufacturing, defense, and logistics companies in Europe and Canada, ESET research finds 11 Aug 2025 ESET researchers

Author rabih
11 Aug

US scrambles to recoup $1M+ nicked by NORKs

The US Department of Justice is trying to recoup around $1 million that three IT specialists secretly working for the North Korean government allegedly stole

Author rabih
11 Aug

Red teams are safe from robots for now, as AI makes better shield than spear

Black Hat/DEF CON At the opening of Black Hat, the largest security shindig in the Hacker Summer Camp week ahead of DEF CON and BSides,

Author rabih
11 Aug

Wikimedia Foundation loses first court battle to swerve Online Safety Act regulation

Wikipedia today lost a legal battle against the UK’s tech secretary to tighten the criteria around the Online Safety Act 2023 (OSA), as it seeks

Author rabih
11 Aug

Intel chief Lip-Bu Tan to visit White House after Trump calls for him to step down

Intel boss Lip-Bu Tan reportedly has an appointment at the White House today, just days after President Donald Trump called for his resignation. The move

Author rabih
11 Aug

Deepfake detectors are slowly coming of age, at a time of dire need

DEF CON While AI was on everyone’s lips in Las Vegas this week at the trio of security conferences in Sin City – BSides, Black

Author rabih
11 Aug

UK retail giant M&S restores Click & Collect months after cyber attack, some services still down

British retailer Marks and Spencer updated its website today, confirming its Click & Collect service is once again available to customers. John Lyttle, one of

Author rabih
11 Aug

Your CV is not fit for the 21st century – time to get it up to scratch

The job market is queasy and since you’re reading this, you need to upgrade your CV. It’s going to require some work to game the

Author rabih
11 Aug

Update WinRAR tools now: RomCom and others exploiting zero-day vulnerability

ESET researchers have discovered a previously unknown vulnerability in WinRAR, being exploited in the wild by Russia-aligned group RomCom. This is at least the third

Author rabih
10 Aug

Trend Micro offers weak workaround for already-exploited critical vuln in management console

Infosec In Brief A critical vulnerability in the on-prem version of Trend Micro’s Apex One endpoint security platform is under active exploitation, the company admitted

Author rabih
10 Aug

DEF CON hackers plug security holes in US water systems amid tsunami of threats

def con A DEF CON hacker walks into a small-town water facility…no, this is not the setup for a joke or a (super-geeky) odd-couple rom-com.

Author rabih
Load moreLoadingAll items loaded