Cyber News

Roeland Nusselder: AI will eat all our energy, unless w...

Left unchecked, AI's energy and carbon footprint could become a significant conc...

How AI-driven identify fraud is causing havoc

Deepfake fraud, synthetic identities, and AI-powered scams make identity theft h...

Neil Lawrence: What makes us unique in the age of AI | ...

As AI advances at a rapid clip, reshaping industries, automating tasks, and rede...

Patch or perish: How organizations can master vulnerabi...

Don’t wait for a costly breach to provide a painful reminder of the importance o...

Katharine Hayhoe: The most important climate equation |...

The atmospheric scientist makes a compelling case for a head-to-heart-to-hands c...

Gaming or gambling? Lifting the lid on in-game loot boxes

The virtual treasure chests and other casino-like rewards inside your children’s...

What is penetration testing? | Unlocked 403 cybersecuri...

Ever wondered what it's like to hack for a living – legally? Learn about the art...

Fake job offers target software developers with infoste...

A North Korea-aligned activity cluster tracked by ESET as DeceptiveDevelopment d...

DeceptiveDevelopment targets freelance developers

ESET researchers analyzed a campaign delivering malware bundled with job intervi...

No, you’re not fired – but beware of job termination scams

Some employment scams take an unexpected turn as cybercriminals shift from “hiri...

Silver Fox APT Uses Winos 4.0 Malware in Cyber Attacks ...

A new campaign is targeting companies in Taiwan with malware known as Winos 4.0 ...

Space Pirates Targets Russian IT Firms With New LuckySt...

The threat actor known as Space Pirates has been linked to a malicious campaign ...

89% of Enterprise GenAI Usage Is Invisible to Organizat...

Organizations are either already adopting GenAI solutions, evaluating strategies...

New TgToxic Banking Trojan Variant Evolves with Anti-An...

Cybersecurity researchers have discovered an updated version of an Android malwa...

PolarEdge Botnet Exploits Cisco and Other Flaws to Hija...

A new malware campaign has been observed targeting edge devices from Cisco, ASUS...

Bybit Hack Traced to Safe{Wallet} Supply Chain Attack E...

The U.S. Federal Bureau of Investigation (FBI) formally linked the record-breaki...