The Cloud Edge Is The New Attack Surface – Dark Reading
The cloud now acts as the connecting infrastructure for many companies’ assets — from IoT devices to workstations to applications and workloads — exposing the edge to threats. – Read…
The cloud now acts as the connecting infrastructure for many companies’ assets — from IoT devices to workstations to applications and workloads — exposing the edge to threats. – Read…
Phishing-as-a-service (PhaaS) kits have become an increasingly popular way for lower-skill individuals who want to get into cybercrime. – Read More
Though the groups have shared their decision to go dark, threat researchers say there are signs that it’s business as usual. – Read More
The threat actor known as TA558 has been attributed to a fresh set of attacks delivering various remote access trojans (RATs) like Venom RAT to breach hotels in Brazil and…
How to choose an external attack surface management (EASM) tool that’s right for your organisation. – Read More
CISSP certification: Requirements, training, exam, and cost The Certified Information Systems Security Professional ‘gold standard’ certification demonstrates your skills, testifies to your experience, and opens career advancement opportunities, including higher…
The AI era means attackers are smarter, faster, and hitting you where you least expect it — your sign-up funnel. – Read More
Check Point has signed an agreement to acquire Lakera, an AI-native security platform specializing in agentic AI applications. Expected to close in Q4 2025 for an undisclosed sum, the deal…
A China-aligned threat actor known as TA415 has been attributed to spear-phishing campaigns targeting the U.S. government, think tanks, and academic organizations utilizing U.S.-China economic-themed lures. “In this activity, the…
Microsoft and Cloudflare executed a coordinated “rugpull” against one of the world’s most sophisticated phishing operations, seizing 338 websites and dismantling infrastructure that generated potentially hundreds of millions of malicious…
Apple has rolled out two new updates to patch a zero-day vulnerability in the ImageIO framework, which may have already been exploited in attacks against specific individuals. The flaw, tracked…
Von dem Cyberangriff auf den Elektrohändler HEM expert sind alle zehn Filialen betroffen. HEM expert Mössingen HEM expert hat kürzlich ein Rundschreiben an seine Kunden verschickt, in dem über einen…
The new lightweight stealer, distributed via underground forums and cracked software, demonstrates an important evolution in the stealth of commodity infostealing malware. – Read More
Quantum computing and AI working together will bring incredible opportunities. Together, the technologies will help us extend innovation further and faster than ever before. But, imagine the flip side, waking…
Generative AI has gone from a curiosity to a cornerstone of enterprise productivity in just a few short years. From copilots embedded in office suites to dedicated large language model…