WhatsApp Bug Anchors Targeted Zero-Click iPhone Attacks – Dark Reading
A “sophisticated” attack that also exploits an Apple zero-day flaw is targeting a specific group of iPhone users, potentially with spyware. – Read More
A “sophisticated” attack that also exploits an Apple zero-day flaw is targeting a specific group of iPhone users, potentially with spyware. – Read More
Threat actors are attempting to leverage a newly released artificial intelligence (AI) offensive security tool called HexStrike AI to exploit recently disclosed security flaws. HexStrike AI, according to its website,…
85% Baker McKenzie has announced an 85% retention rate for its latest batch of London trainees. Of the 20 qualifying trainees, 17 are staying on in newly qualified (NQ) roles…
Varonis plans to integrate SlashNext’s advanced phishing, BEC, and social engineering attack protection capabilities into its data security platform. – Read More
In January 2025, cybersecurity experts at Wiz Research found that Chinese AI specialist DeepSeek had suffered a data leak, putting more than 1 million sensitive log streams at risk. According…
Google has shipped security updates to address 120 security flaws in its Android operating system as part of its monthly fixes for September 2025, including two issues that it said…
An Iran-nexus group has been linked to a “coordinated” and “multi-wave” spear-phishing campaign targeting the embassies and consulates in Europe and other regions across the world. The activity has been…
The private rented sector has been growing in the UK. From 2008/09 to 2023/24, the number of households rose from 3.1m to 4.7m. It makes up 19% of all tenured…
Cloudflare on Tuesday said it automatically mitigated a record-setting volumetric distributed denial-of-service (DDoS) attack that peaked at 11.5 terabits per second (Tbps). “Over the past few weeks, we’ve autonomously blocked…
Convicted earlier this year A trainee solicitor has been hit with restrictions on where and how he can work in the legal profession after being convicted of criminal offences. Salhan…
It was one of the viral tech news stories at the start of July when WeTransfer, the popular file sharing service used massively by companies and end users alike, had…
Most security leaders know the dark web exists, but many still view it as the internet’s seedy underbelly — useful for criminals who want to make illegal transactions, but not…
The initiative will be tailored to students and their growth in cybersecurity preparedness. – Read More
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a high-severity security flaw impacting TP-Link TL-WA855RE Wi-Fi Ranger Extender products to its Known Exploited Vulnerabilities (KEV) catalog, citing…
loading=”lazy” width=”400px”>Lesen Sie, welche Aspekte für einen Krisenkommunikationsplan entscheidend sind. Gorodenkoff – shutterstock.com Cyberangriffe fordern nicht nur CISOs in punkto Prävention und Krisenbewältigung heraus. Auch die Unternehmenskommunikation ist mit im…