Hacking

Malware targeting industrial control systems is raising new concerns as legacy infrastructure connects to modern networks, increasing exposure across energy, transportation, and manufacturing sectors.

Account recovery processes such as password resets and MFA re-enrollment are becoming a primary path attackers use to breach workforce identities.

As the Winter Olympics draw global attention, cybercriminals will target fans and brands with phishing, fake ticket scams, and lookalike sites designed to steal money and credentials.

The Internet Security Alliance says a virtual cyber academy is needed to counter nation-state attacks and ease the workforce shortage that leaves government and industry systems exposed.

As AI browsers gain the ability to summarize, act, and automate tasks, they introduce new risks tied to hidden instructions, credential access, and autonomous behavior that traditional browsers don’t carry.

A new think tank report warns China is running a coordinated, whole-of-society espionage campaign to steal U.S. technology. Experts urge a national response.

Identity crime victims are losing more money and facing deeper emotional distress, according to new findings from the Identity Theft Resource Center.

Researchers at NCC Group have demonstrated how real-time AI voice cloning can be weaponized in voice phishing (vishing) attacks.

The U.S. Secret Service dismantled a massive SIM farm network operating throughout the New York tristate area, exposing vulnerabilities in mobile infrastructure and raising alarms about threats to public safety and national security.

Cyberattacks on SMBs have nearly doubled in the fist half of 2025. The St. Paul ransomware crisis shows why even small governments face big threats as hackers exploit outdated defenses and rising attack-as-a-service offerings.

SOCRadar’s latest report reveals that 82% of dark web threats in North America target U.S. businesses, underscoring the growing risks posed by ransomware, phishing, and data theft.

High costs and complex tools are leaving many SMBs vulnerable to cyberthreats, but affordable, simpler solutions are emerging to help close critical security gaps.

Mobile applications are quietly attracting more and more malevolent attention -- and for good reason. They contain a trove of private information about their users.

By adopting a proactive approach to AI security with red teaming, businesses can uncover hidden vulnerabilities, reduce risks, and build resilient systems.

Loading ... Loading ...

Technewsworld Channels