Featured

Chinese APT Deploys EggStreme Fileless Malware to Breach Philippine Military Systems

An advanced persistent threat (APT) group from China has been attributed to the compromise of a Philippines-based military company using a previously undocumented fileless...

Jaguar Land Rover confirms cyber-attack data breach

close Sign up to the newsletter: In Brief ...

British security minister pledges tougher action against cyber crime, fraud

Britain's Security Minister Dan Jarvis has pledged stronger measures to combat cyber crime and fraud, describing the issue as one of the country's mos... 

UWF Center for Cybersecurity awarded $2M grant to expand Florida cybersecurity training program – University of West Florida Newsroom

Engineering and Computer Science UWF Center for Cybersecurity awarded $2M grant to expand Florida cybersecurity training program Sep. 10, 2025 The University of West Florida Center for...

Apple iPhone 17 With New Memory Integrity Enforcement Feature to Block Mercenary Spyware Attacks

Apple has announced that the upcoming iPhone 17 and iPhone Air will feature a groundbreaking security capability called Memory Integrity Enforcement (MIE), designed to...

Helpdesks struggle to keep up with cyber threats

Helpdesks are bogged down by repetitive, time-consuming tasks (34 percent), long resolution times (34 percent) and limited resources (31 percent). This is among the findings...

Jaguar Land Rover admits hackers may have taken data

Jaguar Land Rover admits hackers may have taken data 5 hours ago Chris VallanceSenior technology reporter and Theo LeggettInternational business correspondent Getty Images Jaguar Land Rover (JLR) has admitted...

King says U.S, is soft on cyber criminals, national cyber defense, deterrence strategy needed

STATEWIDE -- Senator Angus King told an audience of cybersecurity stakeholders that cyber criminals are not facing real consequences for attacks on the U.S.,...

Adobe Commerce Flaw CVE-2025-54236 Lets Hackers Take Over Customer Accounts

Adobe has warned of a critical security flaw in its Commerce and Magento Open Source platforms that, if successfully exploited, could allow attackers to...

Latest articles