News
Perseus Android Malware Hides In Streaming Apps
9+ hour, 1+ min ago (668+ words) At a time when smartphones double as banking hubs, personal diaries, and authentication tools, the emergence of Perseus Android malware highlights a worrying shift: attackers are no longer just stealing passwords, they are studying users. The Perseus Android malware builds…...
Iranian Handala Hackers Launch New Domain Hours After FBI Seizures
3+ day, 18+ hour ago (232+ words) Iranian hacker group Handala Hack Team, the collective behind the famed cyberattack on U.S. MedTech firm Stryker, is back online just hours after the FBI announced its clearnet domains seizure. As per the court documents, all these domains were operated by…...
The Cyber Express Weekly Roundup: Cyberattacks, AI Risks, and Geopolitical Cyber Threats
3+ day, 19+ hour ago (328+ words) TCE Weekly Roundup: Global Warfare, AI Risks, and More'The Cyber Express In this week's cybersecurity roundup, The Cyber Express covers key global security developments, including a major supply chain disruption affecting a global manufacturer, rising concerns over security and legal…...
Digital Risk Protection Gets A Boost From Cyble–Optiv
4+ day, 1+ hour ago (528+ words) Cyble has partnered with Optiv to bring digital risk protection into managed security operations, at a time when most cyber threats are no longer confined to internal networks. The partnership integrates Cyble's threat intelligence capabilities into Optiv's managed security services…...
CRIL: Middle East Cyber Warfare Escalates Rapidly
5+ day, 23+ hour ago (471+ words) Image created with Gemini The findings highlight how modern conflicts now extend beyond physical battlefields. As geopolitical tensions escalate, Middle East cyber warfare is emerging as a key front where cyber operations are used to disrupt services, influence public perception,…...
How Cortex XDR BIOC Rules Could Become an Attack Surface
5+ day, 23+ hour ago (435+ words) A new study focusing on Cortex XDR BIOC rules reveals that encrypted detection logic, designed to remain secure, can be decrypted and examined, creating new risks for organizations relying on endpoint detection technologies." This research highlights an often-overlooked reality in…...
‘Give to Gain’ is Relevant for Security and Resilience: Bonnie Butlin, Chats with TCE
5+ day, 23+ hour ago (696+ words) In an era where cyber threats, geopolitical tensions, and physical security risks increasingly overlap, resilience has become central to how organizations and governments approach security. Few people have worked as actively to connect these conversations across borders and disciplines as…...
Intuitive’s Certain Business, Employee, Corporate Data Accessed in Recent Breach
6+ day, 22+ hour ago (280+ words) While the company publicly acknowledged the breach, it did not specify exactly when the incident occurred or when it was first detected." Despite the seriousness of the Intuitive phishing attack, the company stressed that its core products and services were…...
New York Water Systems Get New Cybersecurity Standards and $2.5M Funding
6+ day, 22+ hour ago (379+ words) Cyber threats targeting critical infrastructure are no longer limited to energy grids or financial networks. Increasingly, water infrastructure cybersecurity has become a major concern for governments worldwide as drinking water and wastewater systems rely more heavily on digital technologies. "Cyber…...
EU AI Act: Ban Proposed For AI Nudification Tools
1+ week, 21+ hour ago (816+ words) The European Union is moving one step closer to refining its landmark EU AI Act, with the European Council proposing new amendments aimed at simplifying regulations while addressing emerging risks from artificial intelligence. On Friday, the Council released its position…...