Organizations in Belarus, Kazakhstan, and Russia have emerged as the target of a phishing campaign undertaken by a previously undocumented hacking group called ComicForm since […]
Top 10 Best Cybersecurity Compliance Management Software in 2025
Cybersecurity compliance has become a mission-critical part of modern business operations. With the rise of data privacy laws, global regulations, and increasing cyber threats, organizations […]
Airport Chaos Shows Human Impact of 3rd-Party Attacks
Major EU airports such as Heathrow were disrupted over the weekend after a cyberattack hit the provider of check-in kiosk software, which caused delays and […]
15 Years of Zero Trust: Why It Matters More Than Ever
With the emergence of AI-driven attacks and quantum computing, and the explosion of hyperconnected devices, zero trust remains a core strategy for security operations. ​The […]
Stellantis Confirms Data Breach Affecting Citroën, Fiat, Jeep, and More
Automotive giant Stellantis has confirmed a significant data breach affecting its North American customer service operations, potentially impacting customers across its portfolio of brands including […]
BlockBlasters Steam Game Disguises Malware as Patch for Computer Download
BlockBlasters, a vibrant 2D platformer/shooter from Genesis Interactive, launched on July 31, 2025 to wide acclaim. However, on August 30, 2025, the developers released Build […]
âš¡ Weekly Recap: Chrome 0-Day, AI Hacking Tools, DDR5 Bit-Flips, npm Worm & More
The security landscape now moves at a pace no patch cycle can match. Attackers aren’t waiting for quarterly updates or monthly fixes—they adapt within hours, […]
European airports continue to crawl after a cyberattack on Collins’ MUSE systems
A cyberattack that began late Friday on an airline service provider in Europe has caused widespread disruption at several of Europe’s busiest airports, triggering flight […]
Threat Actors Exploit Oracle Database Scheduler to Infiltrate Corporate Networks
Threat actors have begun exploiting the Oracle Database Scheduler’s External Jobs feature to execute arbitrary commands on corporate database servers, enabling stealthy initial footholds and […]
How to Gain Control of AI Agents and Non-Human Identities
We hear this a lot: “We’ve got hundreds of service accounts and AI agents running in the background. We didn’t create most of them. We […]