Latest from todayNewsMaking cybercrime illegal won't stop it; making cybersec research legal mayThe UK and Portugal are looking to give protection to ethical hackers to allow them to find and report vulnerabilities without fear of prosecution.By Maxwell CooterDec 10, 20255 minsCybercrimeGovernmentIndustry Opinion Behind the breaches: Case studies that reveal adversary motives and modus operandiBy Suren ReddyDec 10, 20257 minsCyberattacksCybercrimeData BreachFeature Polymorphic AI malware exists — but it’s not what you thinkBy Ax SharmaDec 10, 20259 minsCybercrimeGenerative AIMalware FeatureIgnoring AI in the threat chain could be a costly mistake, experts warnBy Cynthia Brumfield Dec 9, 20259 minsArtificial IntelligenceCyberattacksSecurity NewsManufacturing fares better against ransomware — with room for improvementBy Julia Mutzbauer Dec 9, 20252 minsCybercrimeMalwareRansomware NewsWarning: React2Shell vulnerability already being exploited by threat actorsBy Howard Solomon Dec 5, 20255 minsCyberattacksCybercrimeDevelopment Tools NewsChinese cyberspies target VMware vSphere for long-term persistenceBy Lucian Constantin Dec 5, 20254 minsAdvanced Persistent ThreatsCyberattacksCybercrime BrandPostSponsored by CyberNewsWireSpyCloud Data Shows Corporate Users 3x More Likely to Be Targeted by Phishing Than by MalwareBy Cyber NewsWire – Paid Press Release Dec 5, 20255 minsCloud SecurityCyberattacksCybercrime NewsCoupang breach of 33.7 million accounts allegedly involved engineer insiderBy 이지현 and CSO Staff Dec 4, 20255 minsCyberattacksData BreachE-commerce Services ArticlesnewsSuspicious traffic could be testing CDN evasion, says expertSANS Institute honeypots recently captured curious requests with CDN-related headers.By Howard Solomon Dec 4, 2025 5 minsCybercrimeMalwareSecuritynewsHybrid 2FA phishing kits are making attacks harder to detectA new Salty-Tycoon hybrid is slipping through defenses undetected, and weakening enterprise MFA.By Shweta Sharma Dec 3, 2025 3 minsAuthenticationMultifactor AuthenticationPhishingnewsNewly discovered malicious extensions could be lurking in enterprise browsersOnce-trusted Chrome and Edge add-ons have quietly turned into tools for data harvesting, search manipulation, and a remote-execution backdoor affecting more than 4.3 million users.By Shweta Sharma Dec 2, 2025 4 minsBrowser SecurityCybercrimeMalwarenewsRomCom tries dropping a not-so-romantic payload on Ukraine-linked US firmsThe new RomCom campaign uses SocGholish fake update lures to deliver its Mythic Agent tool against US firms doing business with Ukraine.By Shweta Sharma Nov 28, 2025 3 minsCyberattacksCybercrimeSecuritybrandpostSponsored by CyberNewsWireSpyCloud Data Shows Corporate Users 3x More Likely to Be Targeted by Phishing Than by MalwareBy Cyber NewsWire – Paid Press Release Dec 5, 2025 5 minsCloud SecurityCyberattacksCybercrimenewsScattered Lapsus$ Hunters target Zendesk users with fake domainsResearchers found over 40 fake domains using the same setup as the group's August Salesforce attack.By Gyana Swain Nov 28, 2025 5 minsCyberattacksCybercrimeMalwarenewsOpenAI admits data breach after analytics partner hit by phishing attackMixpanel warns of phishing attacks after criminals steal email addresses and organization IDs from some customer profiles. By John E. Dunn Nov 27, 2025 5 minsAPIsCyberattacksData BreachnewsSonicWall ransomware attacks offer an M&A lesson for CSOs Report urges CSOs be part of all merger or acquisition deals to screen for outdated or poorly configured IT devices.By Howard Solomon Nov 26, 2025 6 minsCybercrimeMalwareRansomwarenewsToddyCat APT evolves to target Outlook archives and Microsoft 365 tokensThe new ToddyCat tooling shifts the group’s focus from browser theft to extracting Outlook mail archives and Microsoft 365 access tokens. By Shweta Sharma Nov 26, 2025 3 minsAdvanced Persistent ThreatsCyberattacksCybercrimenews analysisAlliances between ransomware groups tied to recent surge in cybercrimeRansomware attacks have increased because of new players and partnerships between existing attackers. This is expected to grow further in the lead up to the end of year holidays.By John Leyden Nov 26, 2025 5 minsCybercrimeMalwareRansomwarenewsNew ClickFix attacks use fake Windows Update screens to fool employeesThe latest campaign also hides malware in RGB pixel values of PNG images.By Howard Solomon Nov 25, 2025 8 minsCybercrimeMalwareWindows SecuritynewsJPMorgan, Citi, Morgan Stanley assess fallout from SitusAMC data breachThe breach underscores growing third-party cyber risks in financial services, with vendor-related incidents up 15% year-over-year.By Gyana Swain Nov 24, 2025 4 minsCyberattacksCybercrimeData BreachnewsOAuth token compromise hits Salesforce ecosystem again, Gainsight impactedAttackers leveraged stolen secrets to hijack integrations and access customer data, highlighting the need for enterprises to audit connected apps and enforce token hygiene.By Gyana Swain Nov 21, 2025 5 minsCyberattacksCybercrimeData Breach Show more Show less View all Resources whitepaper AI Code: Your New Security Shield or a Hacker’s Dream Cyber risk is greater than ever. A key reason: the exploding use of AI in code generation — both to develop applications and to spawn exploits. The post AI Code: Your New Security Shield or a Hacker’s Dream appeared first on Whitepaper Repository –. By HCL Software 02 Oct 2025Artificial IntelligenceBusiness OperationsCybercrime whitepaper How Security Leaders Are Meeting the Agentic AI Threat By Synack 29 Sep 2025Artificial IntelligenceBusiness OperationsCybercrime whitepaper AI vs. AI: The Future of Cybersecurity Will Move Faster Than Humans React By Synack 29 Sep 2025Artificial IntelligenceBusiness OperationsCybercrime View all Video on demand video The Future of Cybersecurity Leadership: AI, Governance & Education | Kevin Powers, Boston College How is cybersecurity education changing — and what skills do tomorrow’s security leaders really need? In this episode of Security Sessions, host Joan Goodchild talks with Kevin Powers, Faculty Director and Lecturer at Boston College Law School, about how cybersecurity has evolved from a technical problem to a core business and legal function. Nov 19, 2025 23 minsCyberattacksCybercrimeRisk Management Why ransomware is still a major concern for healthcare systems Nov 28, 2023 44 mins CybercrimeRansomware MGM Resorts Hack: Key Takeaways and Lessons Learned for Cybersecurity Nov 2, 2023 43 mins CyberattacksHackingRansomware Why security awareness training is failing Oct 13, 2023 29 mins CyberattacksCybercrimePhishing See all videos Explore a topicApplication SecurityBusiness ContinuityBusiness OperationsCareersCloud SecurityComplianceCritical InfrastructureIdentity and Access ManagementIndustryIT LeadershipNetwork SecurityPhysical SecurityPrivacyRisk ManagementView all topics Show me morePopularArticlesPodcastsVideos opinion Cybersecurity isn’t underfunded — It’s undermanaged By JC GaillardDec 11, 20257 mins C-SuiteCSO and CISOIT Strategy how-to How to justify your security investments By Chritstoph SchuhwerkDec 11, 20256 mins C-SuiteCSO and CISOIT Leadership news Fortinet admins urged to update software to close FortiCloud SSO holes By Howard SolomonDec 10, 20254 mins Access ControlIdentity and Access ManagementSingle Sign-on podcast CISO Reality: Record Pay, Rising Pressure, and Retention Risk By Joan GoodchildDec 10, 202527 mins CSO and CISOSecurity Infrastructure podcast Inside Visa’s Cyber Defense: CISO Subra Kumaraswamy on blending AI and Human Defense By Joan GoodchildDec 3, 202527 mins Artificial IntelligenceCSO and CISOPhishing podcast The Future of Cybersecurity Leadership: AI, Governance & Education | Kevin Powers, Boston College Nov 19, 202523 mins CyberattacksCybercrimeRisk Management video CISO Reality: Record Pay, Rising Pressure, and Retention Risk By Joan GoodchildDec 10, 202527 mins CSO and CISOSecurity Infrastructure video Inside Visa’s Cyber Defense: CISO Subra Kumaraswamy on blending AI and Human Defense By Joan GoodchildDec 3, 202527 mins Artificial IntelligenceCSO and CISOPhishing video Inside Black Hat: Andy Ellis on vendor buzzwords, AI hype, and the future of the CISO role By Joan GoodchildNov 12, 202531 mins Black HatCSO and CISOCyberattacks