Think Your IdP or CASB Covers Shadow IT? These 5 Risks Prove Otherwise

09/06/2025 0 Comments 0 tags

You don’t need a rogue employee to suffer a breach. All it takes is a free trial that someone forgot to cancel. An AI-powered note-taker quietly syncing with your Google

OpenAI Bans ChatGPT Accounts Used by Russian, Iranian and Chinese Hacker Groups

09/06/2025 0 Comments 0 tags

OpenAI has revealed that it banned a set of ChatGPT accounts that were likely operated by Russian-speaking threat actors and two Chinese nation-state hacking groups to assist with malware development,

New Supply Chain Malware Operation Hits npm and PyPI Ecosystems, Targeting Millions Globally

08/06/2025 0 Comments 0 tags

Cybersecurity researchers have flagged a supply chain attack targeting over a dozen packages associated with GlueStack to deliver malware. The malware, introduced via a change to “lib/commonjs/index.js,” allows an attacker

Malicious Browser Extensions Infect 722 Users Across Latin America Since Early 2025

08/06/2025 0 Comments 0 tags

Cybersecurity researchers have shed light on a new campaign targeting Brazilian users since the start of 2025 to infect users with a malicious extension for Chromium-based web browsers and siphon

New Atomic macOS Stealer Campaign Exploits ClickFix to Target Apple Users

06/06/2025 0 Comments 0 tags

Cybersecurity researchers are alerting to a new malware campaign that employs the ClickFix social engineering tactic to trick users into downloading an information stealer malware known as Atomic macOS Stealer

Empower Users and Protect Against GenAI Data Loss

06/06/2025 0 Comments 0 tags

When generative AI tools became widely available in late 2022, it wasn’t just technologists who paid attention. Employees across all industries immediately recognized the potential of generative AI to boost

Microsoft Helps CBI Dismantle Indian Call Centers Behind Japanese Tech Support Scam

06/06/2025 0 Comments 0 tags

India’s Central Bureau of Investigation (CBI) has revealed that it has arrested four individuals and dismantled two illegal call centers that were found to be engaging in a sophisticated transnational

Inside the Mind of the Adversary: Why More Security Leaders Are Selecting AEV

06/06/2025 0 Comments 0 tags

Cybersecurity involves both playing the good guy and the bad guy. Diving deep into advanced technologies and yet also going rogue in the Dark Web. Defining technical policies and also

New PathWiper Data Wiper Malware Disrupts Ukrainian Critical Infrastructure in 2025 Attack

06/06/2025 0 Comments 0 tags

A critical infrastructure entity within Ukraine was targeted by a previously unseen data wiper malware named PathWiper, according to new findings from Cisco Talos. “The attack was instrumented via a

Popular Chrome Extensions Leak API Keys, User Data via HTTP and Hardcoded Credentials

05/06/2025 0 Comments 0 tags

Cybersecurity researchers have flagged several popular Google Chrome extensions that have been found to transmit data in HTTP and hard-code secrets in their code, exposing users to privacy and security