A Call to Action for Executives

IntroductionManufacturing continues to be one of the most attractive targets for cyber attackers, with attacks only increasing. Once overlooked in favor of data-rich...

Anubis Ransomware Now Hitting Android and Windows Devices

 A sophisticated new ransomware threat has emerged from the cybercriminal underground, presenting a serious challenge to both enterprise and personal cybersecurity. Dubbed Anubis, this malware is not only capable of encrypting files but also stealing login credentials—targeting both Android and Windows platforms simultaneously. First...

Real Enough to Fool You: The Evolution of Deepfakes

Not long ago, deepfakes were digital curiosities – convincing to some, glitchy to...

What Happened and Why It Matters

In June 2025, Albania once again found itself under a digital siege—this time,...

A Call to Action for Executives

IntroductionManufacturing continues to be one of the most attractive targets for cyber attackers,...

Anubis Ransomware Now Hitting Android and Windows Devices

 A sophisticated new ransomware threat has emerged from the cybercriminal underground, presenting a...

Why IT Leaders Must Rethink Backup in the Age of Ransomware

 With IT outages and disruptions escalating, IT teams are shifting their focus beyond...

The Battle Behind the Screens

 As the world watches the escalating military conflict between Israel and Iran, another...

A Call to Action for Executives

IntroductionManufacturing continues to be one of the most attractive targets for cyber attackers, with attacks only increasing. Once overlooked in favor of data-rich...

Real Enough to Fool You: The Evolution of Deepfakes

Not long ago, deepfakes were digital curiosities – convincing to some, glitchy to...

What Happened and Why It Matters

In June 2025, Albania once again found itself under a digital siege—this time,...

Real Enough to Fool You: The Evolution of Deepfakes

Not long ago, deepfakes were digital curiosities – convincing to some, glitchy to...
spot_img

Cyber Balkans

Keeper Security Secures Minority Growth Equity Investment from Summit Partners

Cybersecurity firm Keeper Security has secured a significant minority investment from global growth equity...

What is a Passkey?

Passkeys continue their rise in popularity as an alternative form of user authentication that...

ProofPoint Report: Cybersecurity Stress Resurfaces Following a Brief Calm

A recent survey conducted by cybersecurity firm ProofPoint has revealed that 68% of Chief...

Methods for detecting PaperCut vulnerabilities are circumventable, and Iranian cyber attackers are now involved. A fresh breed of ransomware uses VPNs to penetrate its...

PaperCut vulnerability detection methods have recently been discovered to be easily bypassed, allowing hackers...

Advancements in AI Cybersecurity: Utilizing ChatGPT to Remain Ahead of Cyber Criminals

The field of cybersecurity has rapidly evolved in recent times as the world becomes...

A Call to Action for Executives

IntroductionManufacturing continues to be one of the most attractive targets for cyber attackers,...

Anubis Ransomware Now Hitting Android and Windows Devices

 A sophisticated new ransomware threat has emerged from the cybercriminal underground, presenting a...

Real Enough to Fool You: The Evolution of Deepfakes

Not long ago, deepfakes were digital curiosities – convincing to some, glitchy to...

Delilah Schwartz from Cybersixgill Talks About the Evolving Dark Web and New Threats from ChatGPT and Other AI Technologies.

Delilah Schwartz, a cyber threat analyst from Cybersixgill, has recently given an insightful interview...

Risk and Repeat: Are data extortion attacks equivalent to ransomware?

The threat landscape of ransomware has undergone significant changes, leading to a transformation in...

What is a Passkey?

Passkeys continue their rise in popularity as an alternative form of user authentication that...

Salt Security collaborates with leading API testing experts in IT security

Salt Security has launched its Salt Technical Ecosystem Partner (STEP) program, aimed at helping...

ProofPoint Report: Cybersecurity Stress Resurfaces Following a Brief Calm

A recent survey conducted by cybersecurity firm ProofPoint has revealed that 68% of Chief...

Keeper Security Secures Minority Growth Equity Investment from Summit Partners

Cybersecurity firm Keeper Security has secured a significant minority investment from global growth equity...

Malware

DragonForce Ransomware Linked to Marks and Spencer Digital Outage

Devastating Cyber Attack Strikes Marks & Spencer: Insights and Implications Almost a week ago, the well-known UK-based retailer, Marks & Spencer (M&S), encountered a severe cyber attack that sent its operations into full-blown disruption. Renowned for offering a diverse range of quality clothing, food, and...

Nokoyawa Ransomware Exploits Windows Zero Day Vulnerabilities

A report released by Kaspersky Labs recently shed light on a threat actor that...

PEGA Committee Advocates for Restrictions on Commercial Spyware

The European Parliament committee investigating the abuse of commercial spyware tools such as Pegasus...

Webinar: SD-WAN in the Age of SASE, AI, and Zero Trust—Still a Key Player?

Webinar Explores the Evolution of SD-WAN Amidst SASE, AI, and Zero Trust Frameworks In an...

Link11 Unites Three Brands on a Single Platform with Fresh Branding

Link11 Strengthens Its Position as a Top European Cybersecurity Provider Through Strategic Integration Frankfurt am...
spot_img

RISK MANAGEMENTS

Russian APT28 Hackers Increase Activity Amid Ukraine War, Reports French Security Agency

The ongoing conflict in Ukraine has led to a notable increase in cyber activities conducted by the infamous Russian hacking group known as APT28,...

Explaining the Difference between Symmetric and Asymmetric Encryption

Data is one of the most valuable assets for any organization today. The vast...

Why IT Leaders Must Rethink Backup in the Age of Ransomware

 With IT outages and disruptions escalating, IT teams are shifting their focus beyond...

RansomHub Enhances Extortion Strategy Amidst Evolving RaaS Market

RansomHub’s Strategic Shift in the Ransomware Landscape In a notable development within the evolving ransomware ecosystem, RansomHub has refined its extortion model and expanded its affiliate recruitment efforts. This change comes at a time when significant volatility affects various Ransomware-as-a-Service (RaaS) operators. The recent law...

US House Passes Bill to Evaluate Threats from Foreign Routers

A significant move towards enhancing national security concerning communication infrastructure is underway with the recent passage of a new bill in the U.S. House...

Cyber Architecture

A Call to Action for Executives

IntroductionManufacturing continues to be one of the most attractive targets for cyber attackers,...

Anubis Ransomware Now Hitting Android and Windows Devices

 A sophisticated new ransomware threat has emerged from the cybercriminal underground, presenting a...

Kritische Zero-Day-Schwachstelle in SAP NetWeaver entdecken

Kritische Zero-Day-Sicherheitslücke in SAP NetWeaver Ausgenutzt Am 21. April 2025 wurde eine gravierende Zero-Day-Schwachstelle in...

Many Fuel Tank Monitoring Systems Vulnerable to Disruption, According to Source from Dark Reading

Many Fuel Tank Monitoring Systems Vulnerable to Disruption: A Rising Concern Recent discussions in the...

Police Confirm Minimal Link Between SKT Hacking Incident and 50 Million Won Theft – CHOSUNBIZ

In a recent development, South Korean authorities have confirmed a minimal connection between a hacking incident involving SK Telecom (SKT) and the theft of 50 million won. The investigation revealed that while both events involved cybercriminal activities, they were largely independent of each other. The...

All articles

A Call to Action for Executives

IntroductionManufacturing continues to be one of the most attractive targets for cyber attackers,...

Anubis Ransomware Now Hitting Android and Windows Devices

 A sophisticated new ransomware threat has emerged from the cybercriminal underground, presenting a...

Real Enough to Fool You: The Evolution of Deepfakes

Not long ago, deepfakes were digital curiosities – convincing to some, glitchy to...

What Happened and Why It Matters

In June 2025, Albania once again found itself under a digital siege—this time,...

Why IT Leaders Must Rethink Backup in the Age of Ransomware

 With IT outages and disruptions escalating, IT teams are shifting their focus beyond...

The Battle Behind the Screens

 As the world watches the escalating military conflict between Israel and Iran, another...

Can we ever fully secure autonomous industrial systems?

 In the rapidly evolving world of industrial IoT (IIoT), the integration of AI-driven...

The Hidden AI Threat to Your Software Supply Chain

AI-powered coding assistants like GitHub’s Copilot, Cursor AI and ChatGPT have swiftly transitioned...

Why Business Impact Should Lead the Security Conversation

 Security teams face growing demands with more tools, more data, and higher expectations...

Securing Telecoms in the Age of AI and Critical Infrastructure

 As we reflect on World Telecommunication and Information Society Day (WTISD) 2025, marked...

The VPN You Shouldn’t Have Downloaded

Source : The Hacker NewsA sophisticated malware campaign has emerged, leveraging counterfeit VPN...

Even Resilient Organizations Are Blind to AI Threats

Organizations are underestimating the advanced technology's risks to the software supply chain, according...