Can Google Sheets be used for espionage?
China-linked hackers exploited app to spy on telecoms and governments
China-linked hackers exploited app to spy on telecoms and governments
The idea that employees are the last line of defense in cybersecurity is a flawed strategy that puts undue burden on untrained staff.
The cybersecurity community is abuzz with excitement as RSA 2026 draws near.
Unternehmen investieren in Sicherheitstechnologien, um Risiken zu minimieren und Umsatz zu steigern
Researchers have discovered a new remote access trojan called Steaelite, which combines data theft and ransomware management capabilities in a single tool, making it easier for attackers to launch sophisticated cyberattacks.
Hackers exploit AI tools, adopt new tactics, and target vulnerabilities, as the US government emphasizes offensive operations and deregulation in its cybersecurity strategy.
Samsung reaches settlement with Texas, revising its data collection practices and halting the unauthorized collection of Texans' viewing data without express consent.
A popular Chrome extension, QuickLens, was hijacked to push malware and steal cryptocurrency from approximately 7,000 users, highlighting the risks of third-party browser extensions.
A short-lived malware operation, Arkanix Stealer, was likely developed using AI assistance, offering data-stealing features and anti-analysis capabilities.
South Korea's National Tax Service exposes wallet seed, allowing thief to steal millions
A trail of digital breadcrumbs leads to a teenage botmaster
Understanding the limitations of traditional password audits and their impact on security
The tech world is abuzz with news of a lingering Windows Explorer issue, a persistent cyber threat in Asian sectors, and the growing discussion around auto remediation with agentic AI.
From AI-powered bug detection to evolving ransomware threats and post-quantum cryptography, the cybersecurity landscape is undergoing significant changes.
**Cybersecurity Landscape Shifts: Ransomware, AI, and Phishing Evolve** **Subtitle:** New threats and technologies challenge traditional security measures, as experts weigh in on the implications **Excerpt:** The cybersecurity landscape is undergoing significant changes, with ransomware
A surge in cybercrime cases and critical vulnerabilities sparks concerns over online security
UK warns of potential attacks on British organizations with Middle East ties
Vulnerabilities in AI systems and identity verification processes expose users to hijacking and data theft risks
Balancing Security and Innovation in the Age of Digital Transformation
Arrests follow wave of DDoS attacks on government sites and institutions
Iranian threat group MuddyWater has launched fresh malware attacks on organizations in the Middle East and Africa, as tensions in the region continue to rise.
Lessons from WWII relic's resilience errors inform modern cybersecurity strategies
Frustrated users report difficulty using email client after bug causes cursor to disappear
Optimizely, a major ad tech company, has confirmed a data breach after a sophisticated voice phishing attack compromised its systems, potentially affecting thousands of its business customers.