More

    Cyber News

    5 must-read cybersecurity stories of 2025

    From headline-making cyber attacks to the impact of AI and skills shortages, here are some of the must-read cybersecurity stories from the past 12...

    Gartner® Report: Nozomi Networks recognized as the Company to Beat for AI in Cyber-Physical Systems Security

    SAN FRANCISCO, Dec. 17, 2025 /PRNewswire/ -- Nozomi Networks, offering solutions in OT, IoT and CPS security, today announced it has been recognized as the...

    Spartanburg Co. cyber-attack victims identified

    SPARTANBURG COUNTY, S.C. (WSPA) — A cyberattack in Spartanburg County accessed personal information from county files, prompting officials to notify affected residents in the...

    Firmware and Hardware Cyber Threat News

    Welcome to the Firmware and Hardware Cyber Risk newsletter. The...

    Fix SOC Blind Spots: See Threats to Your Industry & Country in Real Time

    Modern security teams often feel like they're driving through fog with failing headlights. Threats accelerate, alerts multiply, and SOCs struggle to understand which dangers...

    China-Linked Ink Dragon Hacks Governments Using ShadowPad and FINALDRAFT Malware

    The threat actor known as Jewelbug has been increasingly focusing on government targets in Europe since July 2025, even as it continues to attack...

    How Nevada’s CIO Will Build on Year’s Cyber Lessons in 2026

    Government Technology/David Kidd Nevada CIOTimothy Galluzi, who steered the ship in the wake of a major cyber incident earlier this year, said officials in the...

    Banking system laxity a cause for cyber conning: SC | India News – The Times of India

    New Delhi: The Supreme Court on Tuesday said laxity by banks resulting in siphoning of money from people’s accounts due tocyber fraud, including digital...

    APT-C-35 Infrastructure Activity Leveraged Using Apache HTTP Response Indicators

    A significant discovery in threat intelligence reveals that APT-C-35, commonly known as DoNot, continues to maintain an active infrastructure footprint across the internet. Security...

    Latest articles