News
The Evolving Cybersecurity Challenge for Critical Infrastructure
3+ hour, 13+ min ago (859+ words) In April 2025, cyber attackers took over the control system of a small dam in Western Norway and opened a valve for four hours. Norway's security services later publicly attributed the incident to pro-Russian hackers. Reports suggest attackers used weak credentials,…...
From Black Hole to Black Box: Forensics and Investigation Is the New Cyber Frontline
20+ hour, 43+ min ago (382+ words) Falling victim to a cyberattack is now an inevitability rather than a possibility. Organizations can no longer rely solely on prevention, they must be ready to respond quickly and effectively when breaches occur. As attack patterns evolve and breaches become…...
From Gatekeepers to Collaborators: The New Face of Information Security
6+ day, 2+ hour ago (994+ words) Head of Information Security, bet365 Information security used to be a game of rules, not relationships. The job was simple: protect the system by sticking to the rulebook. Security teams were like referees on the pitch " watching for fouls, enforcing the…...
Top Ransomware Trends of 2025
1+ week, 2+ day ago (344+ words) The past year was much quieter than 2024 in ransomware takedown and anti-cybercrime law enforcement operations. Additionally, less organized collectives such as Scattered Spider, Lapsus$ and ShinyHunters grabbed many of the headlines in 2025. However, traditional ransomware syndicates continued to be active…...
New BeaverTail Malware Variant Linked to Lazarus Group
2+ week, 10+ hour ago (355+ words) A newly observed variant of the BeaverTail malware has been tied to'hackers associated with North Korea. The findings come from Darktrace's latest The State of Cybersecurity report, which links BeaverTail activity to DPRK threat clusters assessed to be part of…...
New âLies-in-the-Loopâ Attack Undermines AI Safety Dialogs
2+ week, 22+ hour ago (440+ words) A novel attack technique that undermines a common safety mechanism in agentic AI systems has been detailed by security researchers, showing how human approval prompts can be manipulated to execute malicious code. The issue, observed by Checkmarx researchers, centers on…...
DeadLock Ransomware Uses BYOVD to Evade Security Measures
3+ week, 2+ day ago (338+ words) A new set of tactics linked to a financially motivated threat actor deploying DeadLock ransomware has been observed by cybersecurity researchers. Detailed in'the'latest analysis from Cisco Talos, published today, the campaign used a Bring Your Own Vulnerable Driver (BYOVD) technique…...
UK NCSC Raises Alarms Over Prompt Injection Attacks
3+ week, 2+ day ago (487+ words) Prompt injection vulnerabilities may never be fully mitigated as a category and network defenders should instead focus on ways to reduce their impact, government security experts have warned. Then National Cyber Security Centre (NCSC) technical director for platforms research, David…...
Securing AI for Cyber Resilience: Building Trustworthy and Secure AI
3+ week, 3+ day ago (655+ words) SVP, Head of Cybersecurity Strategic Technology Centre, ST Engineering As artificial intelligence (AI) becomes woven into the fabric of daily life " powering automation, analytics, and decision-making " it simultaneously opens new vulnerabilities for attackers to exploit. Ensuring the security of AI…...
China-Linked Warp Panda Targets North American Firms in Espionage Camp
3+ week, 6+ day ago (381+ words) The previously unknown threat actor exhibits a high level of technical sophistication, advanced operations security (OPSEC) skills and extensive knowledge of cloud and virtual machine (VM) environments, according to information shared by CrowdStrike. The cybersecurity firm said during the summer of…...