North Korean Operatives Use Deepfakes in IT Job Interviews

Use of synthetic identities by malicious employment candidates is yet…

Popular British Retailer Marks & Spencer Addresses ‘Cyber Incident’

M&S has launched an investigation and said some customer operations…

DPRK Hackers Steal $137M from TRON Users in Single-Day Phishing Attack

Multiple threat activity clusters with ties to North Korea (aka…

Japan Warns on Unauthorized Stock Trading via Stolen Credentials

Attackers are using credentials stolen via phishing websites that purport…

Kubernetes Pods Are Inheriting Too Many Permissions

Scalable, effective — and best of all, free — securing…

VibeScamming: Hackers Leverage AI to Craft Phishing Schemes and Functional Attack Models

Cybersecurity researchers at Guardio Labs have unveiled a troubling new…

EU’s GDPR Article 7 Poses New Challenges for Businesses To Secure AI-Generated Image Data

As businesses worldwide embrace digital transformation, the European Union’s General…

Hackers Exploit Gamma AI to Create Sophisticated Microsoft Themed Phishing Redirectors

Cybercriminals are leveraging Gamma AI, a platform for creating presentations,…

Experts Uncover Four New Privilege Escalation Flaws in Windows Task Scheduler

Cybersecurity researchers have detailed four different vulnerabilities in a core…

Morphing Meerkat PhaaS Using DNS Reconnaissance To Generate Phishing Pages Based on Target

Morphing Meerkat, a sophisticated Phishing-as-a-Service (PhaaS) platform first identified in…

Top 5 Cybersecurity News Articles for the Week of January 26, 2025

As we move into 2025, the cybersecurity landscape continues evolving with significant incidents and trends that demand attention. Here’s a roundup of the top 5 […]