Featured

UIB adopts CyberCube tools for cyber risk assessment

United Insurance Brokers (UIB), a Lloyd’s broker operating internationally, has teamed up with cyber risk analytics provider CyberCube to support its global cyber insurance...

Anthropic Says Chinese AI Firms Used 16 Million Claude Queries to Copy Model

Anthropic on Monday said it identified "industrial-scale campaigns" mounted by three artificial intelligence (AI) companies, DeepSeek, Moonshot AI, and MiniMax, to illegally extract Claude's...

Montana’s first cyber warfare officer strengthens state defense

HELENA — As cyber threats continue to target public institutions nationwide, the Montana National Guard has appointed its first cyber warfare officer, marking a...

Cheyenne and Arapaho Tribes add safeguards to network following attempted cyber breach

The Cheyenne and Arapaho Tribes have added additional safeguards to their networks following an attempted cyber breach. Governor of the Cheyenne & Arapaho Tribe, Reggie...

Patient data changed as major NZ health app MediMap hacked

Photo: RNZ/Calvin Samuel The hacked health portal MediMap needs to be doing everything it can to manage the fallout from being hacked, Health New Zealand...

How Schools Can Defend Against AI-Powered Cyber Attacks

(TNS) — Many school districts are ill-prepared to defend themselves against the growing threat of AI-powered cyber attacks, a problem that has been exacerbated...

AI apocalypse isn’t coming for cybersecurity industry, analysts say

Investors are panicking, and security executives are now on the defense. But if anything, AI is only likely to cause a minor stir —...

APT28 Targeted European Entities Using Webhook-Based Macro Malware

The Russia-linked state-sponsored threat actor tracked as APT28 has been attributed to a new campaign targeting specific entities in Western and Central Europe. The activity,...

Wormable XMRig Campaign Uses BYOVD Exploit and Time-Based Logic Bomb

Cybersecurity researchers have disclosed details of a new cryptojacking campaign that uses pirated software bundles as lures to deploy a bespoke XMRig miner program...

Latest articles