Cellcom Restores Regional Mobile Services After Cyberattack – Dark Reading
Customers in parts of Wisconsin and Michigan could not make calls or send text messages for nearly a week after an incident on May 14, and service is still intermittent…
Customers in parts of Wisconsin and Michigan could not make calls or send text messages for nearly a week after an incident on May 14, and service is still intermittent…
The latest cybersecurity awareness campaign asks users to pause for nine seconds before clicking — but this approach misplaces responsibility and ignores the real problems of system design. – Read…
Cybersecurity researchers have discovered a security flaw in Microsoft’s OneDrive File Picker that, if successfully exploited, could allow websites to access a user’s entire cloud storage content, as opposed to…
Using Microsoft OneDrive to upload a file to ChatGPT, Slack, or Zoom could lead to a user handing over access to more than just that one file. According to an…
Dark Reading is offering its readers the opportunity to tell us how we’re doing via a new survey. – Read More
Der Coca-Cola-Abfüller Coca-Cola Europacific Partners ist von einem Datenleck betroffen. Tetiana Chernykova – shutterstock.com Cyberkriminelle behaupten in einem Darknet-Post, mehr als 64 Gigabyte Daten mit 23 Millionen Einträgen von Coca-Cola…
Embedded Linux-based Internet of Things (IoT) devices have become the target of a new botnet dubbed PumaBot. Written in Go, the botnet is designed to conduct brute-force attacks against SSH…
The August acquisition will bring together Red Canary’s extensive integration ecosystem with Zscaler’s cloud transaction data to deliver an AI-powered security operations platform. – Read More
Stealer malware no longer just steals passwords. In 2025, it steals live sessions—and attackers are moving faster and more efficiently than ever. While many associate account takeovers with personal services,…
A financially motivated threat actor has been observed exploiting a recently disclosed remote code execution flaw affecting the Craft Content Management System (CMS) to deploy multiple payloads, including a cryptocurrency…
Would you expect an end user to log on to a cybercriminal’s computer, open their browser, and type in their usernames and passwords? Hopefully not! But that’s essentially what happens…
Cybersecurity researchers have disclosed details of a coordinated cloud-based scanning activity that targeted 75 distinct “exposure points” earlier this month. The activity, observed by GreyNoise on May 8, 2025, involved…
A digital relic dating back to before the birth of the Internet, email was created in 1971 by Roy Tomlinson to electronically send information on the ARPANET research network. At…
Apple on Tuesday revealed that it prevented over $9 billion in fraudulent transactions in the last five years, including more than $2 billion in 2024 alone. The company said the…
Data breaches, social engineering, malware and phishing attacks result in a lot of passwords being leaked. With access to these, AI agents could automate steps of mass account takeover (ATO)…