#cyber-threats

[ follow ]
#cybersecurity
Marketing tech
fromThe Hacker News
1 month ago

Weekly Recap: iPhone Spyware, Microsoft 0-Day, TokenBreak Hack, AI Data Leaks and More

Attackers exploit subtle vulnerabilities, often going unnoticed, emphasizing the need for vigilance in cybersecurity.
Information security
fromNextgov.com
1 month ago

Wrong time for Trump admin to end mobile app security program, cyber lawmaker says

Ending the Mobile App Vetting program may weaken government cybersecurity against rising digital threats.
Information security
fromNextgov.com
1 month ago

Wrong time for Trump admin to end mobile app security program, cyber lawmaker says

Ending the Mobile App Vetting program may weaken government cybersecurity against rising digital threats.
fromIT Pro
1 week ago

Special offer for ITPro readers

Business security is critical in an increasingly hostile threat landscape.
#mobile-security
Information security
fromSecuritymagazine
3 months ago

Nearly 50% of mobile devices run outdated operating systems

Outdated mobile OSes present a significant vulnerability, exploiting nearly 50% of devices.
Mobile phishing threats are increasing, with 'mishing' and 'smishing' as key concerns.
Information security
fromSecuritymagazine
3 months ago

Nearly 50% of mobile devices run outdated operating systems

Outdated mobile OSes present a significant vulnerability, exploiting nearly 50% of devices.
Mobile phishing threats are increasing, with 'mishing' and 'smishing' as key concerns.
fromIT Pro
3 weeks ago

Malware as a service explained: What it is and why businesses should take note

MaaS enables low-skilled criminals to easily access sophisticated cyberattack tools, contributing to a surge in cyber threats.
US politics
fromtime.com
1 month ago

Vance Says U.S. Not at War With Iran' But a Heightened Threat Environment' Advisory Highlights Concern

The U.S. is focusing its military actions on Iran's nuclear program rather than declaring a war against the nation.
Artificial intelligence
fromInfoWorld
1 month ago

Mastering AI risk: An end-to-end strategy for the modern enterprise

AI customization in attacks enhances fraud effectiveness; deepfakes seriously threaten corporate security, particularly targeting executives; a life-cycle management approach is essential.
#cloud-security
fromIT Pro
1 month ago
Information security

Cloud breaches are surging, but enterprises aren't quick enough to react

Information security
fromIT Pro
1 month ago

Cloud breaches are surging, but enterprises aren't quick enough to react

Cloud breaches remain undetected for significant durations due to alert fatigue and tool fragmentation.
fromComputerWeekly.com
2 months ago

RSAC rewind: Agentic AI, governance gaps and insider threats | Computer Weekly

Practically every single person at RSAC 2023 discussed the use of or abuse of artificial intelligence (AI) in cyber security.
Artificial intelligence
Software development
fromHackernoon
4 months ago

Cut Security Costs by Building It Into Your Software from Day One | HackerNoon

Security must be integrated from the start of software development to avoid costly redesigns and critical fixes later.
fromNew York Post
2 months ago

Barfly in fear after thieves snatched her phone and whisked it off to China - and then started sending her threatening texts

It's very scary to have something taken from you. It's really made me more aware of my surroundings and just be safe because you never know, it's scary.
NYC startup
fromLondon On The Inside
2 months ago

How Londoners Are Safeguarding Their Data in a Hyper-Connected World

However, these can expose users to risks like data breaches and fraud. When making online transactions, especially involving sensitive information such as credit card details, it's crucial to check for trust signals like the padlock symbol in the browser's address bar, which indicates the site uses encryption.
Privacy technologies
#data-security
Artificial intelligence
fromZDNET
2 months ago

AI agent adoption is driving increases in opportunities, threats, and IT budgets

Data security is essential for trust and innovation in an AI-driven economy.
Organizations are increasing security budgets to manage evolving threats and compliance complexities.
Privacy professionals
fromDatabreaches
3 months ago

BakerHostetler's 2025 Data Security Incident Response Report Finds Less Malware Used in 2024

Companies are successfully combating ransomware with fewer attacks and quicker recovery times.
Forensic investigation costs have significantly decreased, representing a three-year low.
The focus has shifted to compromised credentials, necessitating stronger access controls.
Post-breach class action lawsuits have slightly decreased, indicating a trend.
Artificial intelligence
fromZDNET
2 months ago

AI agent adoption is driving increases in opportunities, threats, and IT budgets

Data security is essential for trust and innovation in an AI-driven economy.
Organizations are increasing security budgets to manage evolving threats and compliance complexities.
Privacy professionals
fromDatabreaches
3 months ago

BakerHostetler's 2025 Data Security Incident Response Report Finds Less Malware Used in 2024

Companies are successfully combating ransomware with fewer attacks and quicker recovery times.
Forensic investigation costs have significantly decreased, representing a three-year low.
The focus has shifted to compromised credentials, necessitating stronger access controls.
Post-breach class action lawsuits have slightly decreased, indicating a trend.
Remote teams
fromSearch Networking
2 months ago

12 remote access security risks and how to prevent them | TechTarget

Remote access security is essential to prevent breaches and maintain organizational integrity despite its accessibility.
fromThe Hacker News
3 months ago

[Free Webinar] Guide to Securing Your Entire Identity Lifecycle Against AI-Powered Threats

Identity systems face vulnerabilities beyond traditional authentication methods, necessitating comprehensive lifecycle protection.
Attackers increasingly use social engineering and advanced technologies, like deepfakes, to compromise identity systems.
#ransomware
Cryptocurrency
fromThe Hacker News
4 months ago

Medusa Ransomware Hits 40+ Victims in 2025, Demands $100K-$15M Ransom

Medusa ransomware has targeted nearly 400 victims since January 2023, with a marked increase in attacks and ransom demands.
Information security
fromSecuritymagazine
3 months ago

Who's driving ransomware's accelerated growth in 2025

Ransomware incidents are rising sharply due to the influence of initial access brokers.
IABs enable cybercriminals to execute ransomware attacks more efficiently.
Cryptocurrency
fromThe Hacker News
4 months ago

Medusa Ransomware Hits 40+ Victims in 2025, Demands $100K-$15M Ransom

Medusa ransomware has targeted nearly 400 victims since January 2023, with a marked increase in attacks and ransom demands.
Privacy professionals
fromWIRED
3 months ago

Brass Typhoon: The Chinese Hacking Group Lurking in the Shadows

Chinese cyber-hacking groups are evolving, increasingly blending state-backed and criminal activities, complicating attribution efforts and threatening global security.
SF politics
fromCSO Online
3 months ago

Warning to developers: Stay away from these 10 VSCode extensions

Malicious extensions cleverly mimic legitimate tools, making user detection difficult.
fromITProUK
3 months ago

Zero trust gains momentum amid growing network visibility challenges

Organizations face significant visibility challenges negatively impacting threat detection, promoting the adoption of zero trust strategies and tools.
fromLondon Business News | Londonlovesbusiness.com
3 months ago

Why Mac users can no longer ignore cybersecurity risks - London Business News | Londonlovesbusiness.com

Mac users have long felt safe from cyber threats, but the rise in malware incidents uncovers the false security perception surrounding Mac devices.
Information security
Digital life
fromBusiness Matters
4 months ago

How to manage risk in business: lessons from the world of digital strategy

Risk management is essential for sustainable growth in today's digital business environment.
Identifying and assessing risks is the first step to effective risk management.
fromZDNET
4 months ago

Navigating AI-powered cyber threats in 2025: 4 expert security tips for businesses

Cybercriminals are weaponizing AI, using tools like LLMs for hyper-personalized phishing and GANs for deepfake audio/video, which strengthens their attack capabilities.
Privacy professionals
European startups
fromSilicon Canals
4 months ago

Delft-based Q*Bird and Eurofiber secure 1M grant to advance quantum-secured communication - Silicon Canals

Delft-based Q*Bird and partners secured €1M for advancing Quantum Key Distribution technology, enhancing digital security essential for the digital economy.
fromTelecompetitor
5 months ago

netnumber Launches Fraud Prevention Registry

We've created a secure registry that enables participants to share information about fraudulent phone number activities in real time, helping combat ongoing scams.
Privacy professionals
[ Load more ]