09 Jul

Reframing investments in security as investments in the business

Partner content Cybersecurity executives and their teams are under constant pressure and scrutiny. As the barrier to entry for attackers gets lower, organizations need to

Author rabih
09 Jul

Qantas begins telling some customers that mystery attackers have their home address

Qantas says that when cybercrooks attacked a “third party platform” used by the airline’s contact center systems, they accessed the personal information and frequent flyer

Author rabih
09 Jul

Ingram Micro restarts orders – for some – following ransomware attack

Ingram Micro says it is gradually reactivating customer’s ordering capabilities across the world, region by region, now its ransomware attack is thought to be “contained”.

Author rabih
09 Jul

Privacy campaigners pour cold water on London cops’ 1,000 facial recognition arrests

Privacy activists are unimpressed with London’s Metropolitan Police and its use of live facial recognition (LFR) to catch criminals, saying it is not effective use

Author rabih
09 Jul

Iranian ransomware crew reemerges, promises big bucks for attacks on US or Israel

An Iranian ransomware-as-a-service operation with ties to a government-backed cyber crew has reemerged after a nearly five-year hiatus, and is offering would-be cybercriminals cash to

Author rabih
08 Jul

Microsoft enjoys first Patch Tuesday of 2025 with no active exploits

For the first time this year, Microsoft has released a Patch Tuesday bundle with no exploited security problems, although one has been made public already,

Author rabih
08 Jul

Massive browser hijacking campaign infects 2.3M Chrome, Edge users

A Chrome and Edge extension with more than 100,000 downloads that displays Google’s verified badge does what it purports to do: It delivers a color

Author rabih
08 Jul

The cloud-native imperative for effective cyber resilience

Partner content Every organization is investing in cyberresilience tools, training, and processes. Unfortunately, only some of them will be able to successfully respond and recover

Author rabih
08 Jul

SUSE launching region-locked support for the sovereignty-conscious

Linux veteran SUSE has unveiled a new support package aimed at customers concerned about data sovereignty. Called “SUSE Sovereign Premium Support,” the service geo-pins support

Author rabih
08 Jul

Suspected Chinese cybersnoop grounded in Italy after US tipoff

A man who US authorities allege is a member of Chinese state-sponsored cyberespionage outfit Silk Typhoon was arrested in Milan last week following a tipoff

Author rabih
08 Jul

Is your password ecosystem ready for the regulators?

Sponsored feature It’s 2025, and credential theft is a thing of the past. Aha, only joking. In reality the stolen credential problem is still pitifully

Author rabih
08 Jul

Suspected Scattered Spider domains target everyone from manufacturers to Chipotle

While the aviation industry has borne the brunt of Scattered Spider’s latest round of social engineering attacks, the criminals aim to catch manufacturing and medical

Author rabih
07 Jul

CitrixBleed 2 exploits are on the loose as security researchers yell and wave their hands

Multiple exploits are circulating for CVE-2025-5777, a critical bug in Citrix NetScaler ADC and NetScaler Gateway dubbed CitrixBleed 2, and security analysts are warning a

Author rabih
07 Jul

Phishing platforms, infostealers blamed as identity attacks soar

A rise in advanced phishing kits and info-stealing malware are to blame for a 156 percent jump in cyberattacks targeting user logins, say researchers. Security

Author rabih
07 Jul

Nine Years and Counting: NICE RAMPS Communities Keep Expanding Opportunities in Cybersecurity Work and Learning

A lot has changed in America’s cybersecurity workforce development ecosystem since 2016: employment in cybersecurity occupations has grown by more than 300,000[1]; the number of

Author rabih
06 Jul

Stalkerware firm gets scooped by SQL-slinging security snoop

Infosec In Brief A security researcher looking at samples of stalkerware discovered an SQL vulnerability that allowed him to steal a database of 62,000 user

Author rabih
06 Jul

Ingram Micro confirms ransomware behind multi-day outage

Ingram Micro, one of the world’s largest distributors, has confirmed it is trying to restore systems following a ransomware attack. As exclusively revealed, troubles began

Author rabih
05 Jul

Massive spike in use of .es domains for phishing abuse

Cybersecurity experts are reporting a 19x increase in malicious campaigns being launched from .es domains, making it the third most common, behind only .com and

Author rabih
Load moreLoadingAll items loaded