EncryptHub breaches 618 orgs to deploy infostealers, ransomware
A threat actor tracked as ‘EncryptHub,’ aka Larva-208, has been targeting organizations worldwide with spear-phishing and social engineering attacks to...
Five takeaways from Cisco Live EMEA
Cisco held its European user event in Amsterdam this month, presenting a good mix of industry trends, product...
Five best practices for securing Active Directory service accounts
Windows Active Directory (AD) service accounts are prime cyber-attack targets due to their elevated privileges and automated/continuous access...
Crypto sleuths join hunt for $1.5bn stolen in biggest ever heist
ByBit is offering financial rewards to anyone who can spot criminals attempting to launder the stolen crypto. Source::...
Red Hat OpenShift 4.18 expands cloud-native networking
Red Hat is updating its OpenShift platform with a series of capabilities that will provide more advanced networking and...
Keep AI interactions secure and risk-free with Guardrails in AI Gateway
The transition of AI from experimental to production is not without its challenges. Developers face the challenge of...
Leaked Black Basta Chat Logs Reveal $107M Ransom Earnings and Internal Power Struggles
More than a year’s worth of internal chat logs from a ransomware gang known as Black Basta have...
Australian IVF giant Genea breached by Termite ransomware gang
The Termite ransomware gang has claimed responsibility for breaching and stealing sensitive healthcare data belonging to Genea patients, one...
OpenAI’s GPT 4.5 spotted in Android beta, launch imminent
OpenAI’s newest model, GPT-4.5, is coming sooner than we expected. A new reference has been spotted on ChatGPT’s...
SOC 3.0 – The Evolution of the SOC and How AI is Empowering Human Talent
Organizations today face relentless cyber attacks, with high-profile breaches hitting the headlines almost daily. Reflecting on a long...
Apple AI tool transcribed the word ‘racist’ as ‘Trump’
Experts have questioned the company’s explanation that it is due to the two words being similar. Source:: BBC...
New Linux Malware ‘Auto-Color’ Grants Hackers Full Remote Access to Compromised Systems
Universities and government organizations in North America and Asia have been targeted by a previously undocumented Linux malware...
Three Password Cracking Techniques and How to Defend Against Them
Passwords are rarely appreciated until a security breach occurs; suffice to say, the importance of a strong password...
CERT-UA Warns of UAC-0173 Attacks Deploying DCRat to Compromise Ukrainian Notaries
The Computer Emergency Response Team of Ukraine (CERT-UA) on Tuesday warned of renewed activity from an organized criminal...
Malicious PyPI Package “automslc” Enables 104K+ Unauthorized Deezer Music Downloads
Cybersecurity researchers have flagged a malicious Python library on the Python Package Index (PyPI) repository that facilitates unauthorized...
AI, automation spur efforts to upskill network pros
Networking skills are evolving to keep pace with broader technology trends, and network pros need to proactively develop...
Windows 11 KB5052093 update released with 33 changes and fixes
Microsoft has released the February 2025 preview cumulative update for Windows 11 24H2, with 33 improvements and fixes...
Windows 11 24H2 upgrades now blocked for some AutoCAD users
Microsoft has introduced a new Windows 11 24H2 upgrade block for systems with AutoCAD 2022, addressing compatibility issues...
What Apple pulling Advanced Data Protection means for you
The tech giant’s decision has prompted questions and concerns about reduced protections for UK iCloud users. Source:: BBC...
CISA Adds Microsoft and Zimbra Flaws to KEV Catalog Amid Active Exploitation
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday placed two security flaws impacting Microsoft Partner Center...