EclecticIQ analysts assess with high confidence that ShinyHunters is expanding its operations by combining AI-enabled voice phishing, supply chain compromises, and leveraging malicious insiders, such […]
Microsoft schaltet gefährliches Phishing-Netzwerk ab
Über die Phishing-as-a-Service-Plattform RaccoonO365 sollen mehr als 5.000 Microsoft-Accounts in 94 Ländern kompromittiert worden sein. janews – shutterstock.com Die Digital Crimes Unit (DCU) von Microsoft […]
Salt Security Announces Industry First Solution to Secure API Actions Taken by AI Agents
At CrowdStrike Fal.Con 2025, Salt Security announced the industry’s first solution to secure the actions AI agents take in the enterprise. As large organisations adopt […]
KnowBe4 Report Reveals UK Retail Sector on High Alert for Cyber Scams
KnowBe4, the human risk management platform, has released a new report entitled IT and Cybersecurity Trends in UK Retail: 2025 Survey Insights. The findings revealed […]
Hackers Target Facebook Accounts in Latest Phishing Attack
A newly discovered phishing campaign is exploiting Facebook’s external URL warning feature to dupe users into handing over their login credentials. By abusing Facebook’s “You’re […]
Ransomware-Lage verschärft sich drastisch
Zscaler gewährt Einblicke in das globale Ransomware-Ökosystem. JLStock Der jährliche ThreatLabz Ransomware-Report (PDF) von Zscaler hält auch 2025 eher keine guten Nachrichten bereit. Demnach: ist […]
SonicWall Advises Users to Reset Logins After Config Backup Leak
SonicWall has alerted its customers to reset all login credentials after a recent leak exposed firewall configuration backups. The vendor emphasizes three critical stages—containment, remediation, […]
Insight Partners Confirms Data Breach Exposing Users’ Personal Data
Insight Partners, a global venture capital and private equity firm, has officially confirmed a significant data breach that exposed personal information of individuals connected to […]
Splunk Publishes Guide to Spot Remote Work Fraud in Organizations
Splunk today unveiled a comprehensive guide designed to empower security teams to detect Remote Employment Fraud (REF) during the critical onboarding phase—when imposters have already […]
Warlock Ransomware Deployed via Compromised GOLD SALEM Networks and Bypassed Security Solutions
Counter Threat Unitâ„¢ (CTU) researchers are tracking a sophisticated threat actor known as Warlock Group, which CTU designates as GOLD SALEM. Since March 2025, the […]