Meta on Tuesday said it has made available a tool called WhatsApp Research Proxy to some of its long-time bug bounty researchers to help improve […]
Iranian Hackers Use DEEPROOT and TWOSTROKE Malware in Aerospace and Defense Attacks
Suspected espionage-driven threat actors from Iran have been observed deploying backdoors like TWOSTROKE and DEEPROOT as part of continued attacks aimed at aerospace, aviation, and […]
Researchers Detail Tuoni C2’s Role in an Attempted 2025 Real-Estate Cyber Intrusion
Cybersecurity researchers have disclosed details of a cyber attack targeting a major U.S.-based real-estate company that involved the use of a nascent command-and-control (C2) and […]
The Quantum Future Is Coming – Hackers Are Already Preparing
In 2025 we’re not just fighting today’s headline-grabbing cyber threats, but we’re also preparing for tomorrow’s. Technology is evolving at a pace that is both […]
KnowBe4 merges training content to create Studios
KnowBe4’s award-winning training content has now merged together under one umbrella, branded as KnowBe4 Studios. It will feature AI-forward training, fresh content, interactive games and […]
Salt Security Launches GitHub Connect to Proactively Discover Shadow APIs and MCP Risks in Code Repositories
API security organisation Salt Security has announced the latest expansion of its innovative Salt Cloud Connect capability. It extends the same agentless model customers trust […]
Rethinking identity for the AI era: CISOs must build trust at machine speed
CISOs have a burgeoning identity crisis on their hands. According to Verizon’s 2025 Data Breach Investigation Report, cyber attackers have switched up their initial access […]
Stadtwerke Detmold von Hackerangriff betroffen
Auf der Website der Stadtwerke Detmold befindet sich aktuell ein Banner mit einem Hinweis zu einer IT-Störung. Stadtwerke Detmold – Screenshot Die Stadtwerke Detmold informieren […]
Energiesektor im Visier von Hackern
Energieversorger müssen ihre Systeme vor immer raffinierteren Cyberangriffen schützen. vectorfusionart – shutterstock.com Die Energieversorgung ist das Rückgrat moderner Gesellschaften. Stromnetze, Gaspipelines und digitale Steuerungssysteme bilden […]
Seven npm Packages Use Adspect Cloaking to Trick Victims Into Crypto Scam Pages
Cybersecurity researchers have discovered a set of seven npm packages published by a single threat actor that leverages a cloaking service called Adspect to differentiate […]