Strengthening Cyber Resilience Through Supplier Management

 Recent data shows third-party and supply chain breaches — including software supply chain attacks — now cost an average of $4.91 million per incident,...

A New Wave of Finance-Themed Scams

 The hyperconnected world has made it easier than ever for businesses and consumers to exchange documents, approve transactions, and complete critical financial workflows with just a click. Digital file sharing and electronic signature platforms used widely across banking, real estate, insurance, and everyday...

New DroidLock malware locks Android devices and demands a ransom

 A newly discovered Android malware dubbed DroidLock can lock victims’ screens for ransom...

Hamas-Linked Hackers Probe Middle Eastern Diplomats

 A cyber threat group affiliated with Hamas has been conducting espionage across the...

Strengthening Cyber Resilience Through Supplier Management

 Recent data shows third-party and supply chain breaches — including software supply chain attacks...

A New Wave of Finance-Themed Scams

 The hyperconnected world has made it easier than ever for businesses and consumers...

Why Lateral Movement Is Still the Cyber Threat You Shouldn’t Ignore

Most businesses treat breaches as perimeter problems — patch the firewall, update the...

How Global Tensions Shape the Attack Surface

Geopolitics as a core driver of cyber riskGeopolitics plays a decisive role in...

Strengthening Cyber Resilience Through Supplier Management

 Recent data shows third-party and supply chain breaches — including software supply chain attacks — now cost an average of $4.91 million per incident,...

New DroidLock malware locks Android devices and demands a ransom

 A newly discovered Android malware dubbed DroidLock can lock victims’ screens for ransom...

Hamas-Linked Hackers Probe Middle Eastern Diplomats

 A cyber threat group affiliated with Hamas has been conducting espionage across the...

New DroidLock malware locks Android devices and demands a ransom

 A newly discovered Android malware dubbed DroidLock can lock victims’ screens for ransom...
spot_img

Cyber Balkans

Keeper Security Secures Minority Growth Equity Investment from Summit Partners

Cybersecurity firm Keeper Security has secured a significant minority investment from global growth equity...

What is a Passkey?

Passkeys continue their rise in popularity as an alternative form of user authentication that...

ProofPoint Report: Cybersecurity Stress Resurfaces Following a Brief Calm

A recent survey conducted by cybersecurity firm ProofPoint has revealed that 68% of Chief...

Methods for detecting PaperCut vulnerabilities are circumventable, and Iranian cyber attackers are now involved. A fresh breed of ransomware uses VPNs to penetrate its...

PaperCut vulnerability detection methods have recently been discovered to be easily bypassed, allowing hackers...

Advancements in AI Cybersecurity: Utilizing ChatGPT to Remain Ahead of Cyber Criminals

The field of cybersecurity has rapidly evolved in recent times as the world becomes...

Strengthening Cyber Resilience Through Supplier Management

 Recent data shows third-party and supply chain breaches — including software supply chain attacks...

A New Wave of Finance-Themed Scams

 The hyperconnected world has made it easier than ever for businesses and consumers...

New DroidLock malware locks Android devices and demands a ransom

 A newly discovered Android malware dubbed DroidLock can lock victims’ screens for ransom...

Delilah Schwartz from Cybersixgill Talks About the Evolving Dark Web and New Threats from ChatGPT and Other AI Technologies.

Delilah Schwartz, a cyber threat analyst from Cybersixgill, has recently given an insightful interview...

What is a Passkey?

Passkeys continue their rise in popularity as an alternative form of user authentication that...

Risk and Repeat: Are data extortion attacks equivalent to ransomware?

The threat landscape of ransomware has undergone significant changes, leading to a transformation in...

Salt Security collaborates with leading API testing experts in IT security

Salt Security has launched its Salt Technical Ecosystem Partner (STEP) program, aimed at helping...

ProofPoint Report: Cybersecurity Stress Resurfaces Following a Brief Calm

A recent survey conducted by cybersecurity firm ProofPoint has revealed that 68% of Chief...

Keeper Security Secures Minority Growth Equity Investment from Summit Partners

Cybersecurity firm Keeper Security has secured a significant minority investment from global growth equity...

Malware

DragonForce Ransomware Linked to Marks and Spencer Digital Outage

Devastating Cyber Attack Strikes Marks & Spencer: Insights and Implications Almost a week ago, the well-known UK-based retailer, Marks & Spencer (M&S), encountered a severe cyber attack that sent its operations into full-blown disruption. Renowned for offering a diverse range of quality clothing, food, and...

Nokoyawa Ransomware Exploits Windows Zero Day Vulnerabilities

A report released by Kaspersky Labs recently shed light on a threat actor that...

PEGA Committee Advocates for Restrictions on Commercial Spyware

The European Parliament committee investigating the abuse of commercial spyware tools such as Pegasus...

Webinar: SD-WAN in the Age of SASE, AI, and Zero Trust—Still a Key Player?

Webinar Explores the Evolution of SD-WAN Amidst SASE, AI, and Zero Trust Frameworks In an...

Link11 Unites Three Brands on a Single Platform with Fresh Branding

Link11 Strengthens Its Position as a Top European Cybersecurity Provider Through Strategic Integration Frankfurt am...
spot_img

RISK MANAGEMENTS

Russian APT28 Hackers Increase Activity Amid Ukraine War, Reports French Security Agency

The ongoing conflict in Ukraine has led to a notable increase in cyber activities conducted by the infamous Russian hacking group known as APT28,...

Explaining the Difference between Symmetric and Asymmetric Encryption

Data is one of the most valuable assets for any organization today. The vast...

Why Lateral Movement Is Still the Cyber Threat You Shouldn’t Ignore

Most businesses treat breaches as perimeter problems — patch the firewall, update the...

RansomHub Enhances Extortion Strategy Amidst Evolving RaaS Market

RansomHub’s Strategic Shift in the Ransomware Landscape In a notable development within the evolving ransomware ecosystem, RansomHub has refined its extortion model and expanded its affiliate recruitment efforts. This change comes at a time when significant volatility affects various Ransomware-as-a-Service (RaaS) operators. The recent law...

US House Passes Bill to Evaluate Threats from Foreign Routers

A significant move towards enhancing national security concerning communication infrastructure is underway with the recent passage of a new bill in the U.S. House...

Cyber Architecture

Strengthening Cyber Resilience Through Supplier Management

 Recent data shows third-party and supply chain breaches — including software supply chain attacks...

A New Wave of Finance-Themed Scams

 The hyperconnected world has made it easier than ever for businesses and consumers...

Kritische Zero-Day-Schwachstelle in SAP NetWeaver entdecken

Kritische Zero-Day-Sicherheitslücke in SAP NetWeaver Ausgenutzt Am 21. April 2025 wurde eine gravierende Zero-Day-Schwachstelle in...

Many Fuel Tank Monitoring Systems Vulnerable to Disruption, According to Source from Dark Reading

Many Fuel Tank Monitoring Systems Vulnerable to Disruption: A Rising Concern Recent discussions in the...

Police Confirm Minimal Link Between SKT Hacking Incident and 50 Million Won Theft – CHOSUNBIZ

In a recent development, South Korean authorities have confirmed a minimal connection between a hacking incident involving SK Telecom (SKT) and the theft of 50 million won. The investigation revealed that while both events involved cybercriminal activities, they were largely independent of each other. The...

All articles

Strengthening Cyber Resilience Through Supplier Management

 Recent data shows third-party and supply chain breaches — including software supply chain attacks...

A New Wave of Finance-Themed Scams

 The hyperconnected world has made it easier than ever for businesses and consumers...

New DroidLock malware locks Android devices and demands a ransom

 A newly discovered Android malware dubbed DroidLock can lock victims’ screens for ransom...

Hamas-Linked Hackers Probe Middle Eastern Diplomats

 A cyber threat group affiliated with Hamas has been conducting espionage across the...

Why Lateral Movement Is Still the Cyber Threat You Shouldn’t Ignore

Most businesses treat breaches as perimeter problems — patch the firewall, update the...

How Global Tensions Shape the Attack Surface

Geopolitics as a core driver of cyber riskGeopolitics plays a decisive role in...

New NIS-2 Law in Germany Expands Cybersecurity Oversight and Introduces Heavy Fines

 Germany is taking decisive steps to strengthen its cybersecurity framework following the rise...

The First Step Toward AI Operating Systems

 The Big PictureOpenAI’s ChatGPT Atlas browser is the prototype for how we’ll use...

A Call to Action for Executives

IntroductionManufacturing continues to be one of the most attractive targets for cyber attackers,...

Anubis Ransomware Now Hitting Android and Windows Devices

 A sophisticated new ransomware threat has emerged from the cybercriminal underground, presenting a...

Real Enough to Fool You: The Evolution of Deepfakes

Not long ago, deepfakes were digital curiosities – convincing to some, glitchy to...

What Happened and Why It Matters

In June 2025, Albania once again found itself under a digital siege—this time,...