Featured

UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors

A previously unknown threat actor tracked as UAT-9921 has been observed leveraging a new modular framework called VoidLink in its campaigns targeting the technology...

Cyber insurance enters the AI risk era as limits, wording and underwriting models shift

Rising loss potential, AI-driven threats and legacy tech exposure are forcing insurers and buyers to rethink cyber limits, coverage design and risk monitoring ...

Cyber-security governance: why boards can no longer rely on technical reporting

Cyber-security has moved beyond operational IT management. It now sits firmly within executive accountability and enterprise risk oversight. Across Europe, regulation is formalising this shift....

Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History

Cybersecurity researchers have discovered a malicious Google Chrome extension that's designed to steal data associated with Meta Business Suite and Facebook Business Manager. The extension,...

Why cyber risk Is now a retail KPI

close Sign up to the newsletter: In Brief Visit ourPrivacy Policyfor more information about our services, how we may use, process and share your personal data,...

Major ‘vibe-coding’ platform Orchids is easily hacked, researcher finds

AI coding platform's flaws allow BBC reporter to be hacked 7 hours ago Joe TidyCyber correspondent, BBC World Service BBC The BBC has been shown a significant...

SCSU Cyber Team Repeats as State Champions, Eyes Midwest Regional Showdown

(KNSI) - The St. Cloud State University Cyber Competition Club has proven once again when it comes to defendin... 

Cyber Agency to Hold Town Halls On Data Breach Reporting Changes

The Cybersecurity and Infrastructure Security Agency is asking for additional feedback on how to refine the scope and burdens of a Biden-era cyber incident...

Latest articles