North Korean Hackers Spread Malware via Fake Crypto Firms and Job Interview Lures on April 25, 2025 Posted by The Hacker News
SAP Confirms Critical NetWeaver Flaw Amid Suspected Zero-Day Exploitation by Hackers on April 25, 2025 Posted by The Hacker News
Hackers access sensitive SIM card data at South Korea’s largest telecoms company on April 25, 2025 Posted by Graham Cluley
Posted in Georgia Guest blog Hacking Law & order Security threats Hacked buses blare out patriotic pro-European anthems in Tbilisi, attack government on January 27, 2025 Graham Cluley
Posted in Georgia Guest blog Hacking Law & order Security threats Hacked buses blare out patriotic pro-European anthems in Tbilisi, attack government on January 27, 2025 Graham Cluley
Posted in 2025 APT attack simulation cyber attack simulation cybersecurity Cymulate Hacking Interview Podcast Podcasts Risk risk management security validation Spotlight trends vulnerabilities Security Validation: A Deep Dive with Cymulate’s David Kellerman on January 15, 2025 Paul F. Roberts
Posted in Amazon Web Services APT botnet china CISO CISO Close Up Companies defend forward end of life Firewall Hacking Internet of Things Podcasts Software sophos Spotlight Technologies Threats Top Stories Volt Typhoon Pacific Rim: Sophos’ 6 Year Battle To Beat Back China State Hackers on November 21, 2024 Paul F. Roberts
Posted in 23andMe cat data breach Data loss Hacking LAPSUS$ Law & order Podcast search engine poisoning Security threats seo Smashing Security Smashing Security podcast #393: Who needs a laptop to hack when you have a Firestick? on November 13, 2024 Graham Cluley
Posted in critical infrastructure Guest blog Hacking Iran Security threats water supply US offers $10 million bounty for members of Iranian hacking gang on October 25, 2024 Graham Cluley
Posted in AT&T Companies data broker data privacy data theft Facebook Hacking identity theft National Public Data Optery personal data management Podcasts Spotlight startup Threats trends Episode 258: Broken Brokers – Optery’s Fight To Claw Back Your Personal Data on August 29, 2024 Paul F. Roberts
Posted in APT Business china CISO CISO Close Up Companies Conferences critical infrastructure CSO Cyber Attack DirectDefense Government Hacking ICS industrial control systems (ICS) Internet of Things Interview MSSP operational security operational technologies Operational Technology OT Podcast Podcasts RSA Conference Spotlight Technologies Threats Top Stories Utility Volt Typhoon Spotlight Podcast: OT Is Under Attack. Now What? on June 5, 2024 Paul F. Roberts
Posted in APT Business china CISA Companies critical infrastructure CSO DirectDefense Government hacks Internet of Things Interview MSSP operational technologies Operational Technology OT Podcast Podcasts social engineering Spotlight Technologies Threats Top Stories Spotlight Podcast: CSO Chris Walcutt on Managing 3rd Party OT Risk on May 16, 2024 Paul F. Roberts
Posted in Business Conferences Consumer data privacy DefCon firmware Hacking hardware Internet of Things Interview Law linux Networking Podcast Podcasts reverse engineering right to repair robot vacuum smart home Software Spotlight surveillance The Fight to Repair Top Stories vulnerabilities Episode 254: Dennis Giese’s Revolutionary Robot Vacuum Liberation Movement on December 19, 2023 Paul F. Roberts