10 Jun

Winning the war on ransomware with AI: Four real-world use cases

Partner Content Cybercriminals are evolving, and so are the tools to stop them. As AI becomes more accessible, attackers are sharpening their tactics. But here’s

Author rabih
10 Jun

Trump guts digital ID rules, claims they help ‘illegal aliens’ commit fraud

President Donald Trump late Friday signed a cybersecurity-focused executive order that, in the White House’s words, “amends problematic elements of Obama and Biden-era Executive Orders.”

Author rabih
10 Jun

Cloud brute-force attack cracks Google users’ phone numbers in minutes

A researcher has exposed a flaw in Google’s authentication systems, opening it to a brute-force attack that left users’ mobile numbers up for grabs. The

Author rabih
10 Jun

M&S online ordering system operational 46 days after cyber shutdown

UK retailer Marks & Spencer has reinstated online orders for some customers, marking a major milestone in its recovery from a cyberattack in April. According

Author rabih
10 Jun

Peep show: 40K IoT cameras worldwide stream secrets to anyone with a browser

Security researchers managed to access the live feeds of 40,000 internet-connected cameras worldwide and they may have only scratched the surface of what’s possible. Supporting

Author rabih
10 Jun

Apple tries to contain itself with lightweight Linux VMs for macOS

Apple on Monday unveiled an open source containerization framework for creating and running Linux container images on the Mac. Software containers combine applications and their

Author rabih
09 Jun

Let them eat junk food: Major organic supplier to Whole Foods, Walmart, hit by cyberattack

North American grocery wholesaler United Natural Foods told regulators that a cyber incident temporarily disrupted operations, including its ability to fulfill customer orders. In a

Author rabih
09 Jun

Blocking stolen phones from the cloud can be done, should be done, won’t be done

Opinion A lot of our tech world is nightmarish, but sometimes this is literally true. The fear of our mobile devices not working when we

Author rabih
09 Jun

Chinese spy crew appears to be preparing for conflict by backdooring 75+ critical orgs

An IT services company, a European media group, and a South Asian government entity are among the more than 75 companies where China-linked groups have

Author rabih
09 Jun

Are technologists a threat to doing business securely?

Partner content Cybersecurity leaders are fighting an invisible war, not just with threat actors but within their own organizations. It’s a conflict I’ve spent a

Author rabih
09 Jun

China’s asteroid-and-comet hunter probe unfurls a ‘solar wing’

China’s space agency has revealed its Tianwen 2 probe has unfurled a ‘solar wing’. The mission launched in May on a course that will take

Author rabih
08 Jun

US infrastructure could crumble under cyberattack, ex-NSA advisor warns

Infosec in Brief If a cyberattack hit critical infrastructure in the US, it would likely crumble, former deputy national security adviser and NSA cybersecurity director

Author rabih
08 Jun

Enterprises are getting stuck in AI pilot hell, say Chatterbox Labs execs

Interview Before AI becomes commonplace in enterprises, corporate leaders have to commit to an ongoing security testing regime tuned to the nuances of AI models.

Author rabih
06 Jun

ChatGPT used for evil: Fake IT worker resumes, misinfo, and cyber-op assist

Fake IT workers possibly linked to North Korea, Beijing-backed cyber operatives, and Russian malware slingers are among the baddies using ChatGPT for evil, according to

Author rabih
06 Jun

Fresh strain of pro-Russian wiper flushes Ukrainian critical infrastructure

A new strain of wiper malware targeting Ukrainian infrastructure is being linked to pro-Russian hackers, in the latest sign of Moscow’s evolving cyber tactics. An

Author rabih
06 Jun

Uncle Sam moves to seize $7.7M laundered by North Korean IT worker ring

The US is looking to finally capture the $7.74 million it froze over two years ago after indicting alleged money launderers it claims are behind

Author rabih
06 Jun

Your ransomware nightmare just came true – now what?

Feature So, the worst has happened. Computer screens all over your org are flashing up a warning that you’ve been infected by ransomware, or you’ve

Author rabih
05 Jun

Uncle Sam puts $10M bounty on RedLine dev and Russia-backed cronies

The US government is offering up to $10 million for information on foreign government-backed threat actors linked to the RedLine malware, including its suspected developer,

Author rabih
Load moreLoadingAll items loaded