AI/MLNorth Korea launches hacking hub focused on artificial intelligence"Research Center 227" reportedly focused on using AI for cyberattacks.
Network SecurityRooted, jailbroken mobile devices pose security risk to organizationsOne out of every 1,000 devices it encounters have either been rooted (Android) or jailbroken (iOS).
Threat IntelligenceClearFake exploits Web3 capabilities for malware campaignThe threat actor retrieves resources and payloads from smart contracts on the Binance Smart Chain.
Security OperationsNew research reveals flaws in security team performance metrics IDC's survey of 900 security leaders reveals widespread use of volume-based metrics for team performance. How do we shift from measuring activity to measuring true impact?
AI/MLHow AI coding assistants could be compromised via rules fileResearchers showed how GitHub Copilot and Cursor could be manipulated with hidden Unicode.
RansomwareAkira ransomware decryption method uses GPUs to brute force keysSource code for the decryption method was published by programmer Yohanes Nugroho.
Vulnerability ManagementApache Tomcat flaw actively exploited; could allow ‘devastating’ RCERemote code execution may be achieved on vulnerable servers with a single PUT API request.
Cloud SecurityHow to plan your cloud migration with security in mindTo protect your cloud-based assets, your organization must consider security and compliance when planning your cloud migration journey.
Application securityAndroid spyware ‘KoSpy’ spread by suspected North Korean APTMalicious apps previously in the Google Play Store enabled theft of messages, files and more.
Phishing95% of data breaches involve human error, report revealsMeanwhile, employees tend to be overconfident in their ability to detect scams.
Proactive law enforcement takedowns in 2024 reshaped the cybercrime ecosystemDon Smith December 30, 2024
Thai police warn scam centers on Myanmar border remain active despite crackdownSC StaffMarch 19, 2025
Meta: FreeType flaw affecting multiple Linux distributions under active exploitationSC StaffMarch 19, 2025