Patch Tuesday: Microsoft Fixes 57 Security Flaws

Patch Tuesday: Microsoft Fixes 57 Security Flaws

Image: Microsoft News Microsoft just dropped its March 2025 Patch Tuesday update, which includes 57 fixes though closer to 70 with third-party vulnerabilities included. The update addresses some critical security issues that require immediate attention, including the following six zero-day vulnerabilities that hackers are actively exploiting. CVE-2025-26633: A security hole in Microsoft Management Console that lets hackers bypass normal protections. They typically trick you into opening a specially designed file or website through email or…

Read More

Pressure Mounts for Apple as Brazilian Court Demands iOS Sideloading

Pressure Mounts for Apple as Brazilian Court Demands iOS Sideloading

A Brazilian court has dealt a major blow to Apple’s tightly controlled ecosystem, ordering the tech giant to allow sideloading on iOS within 90 days. The ruling follows similar mandates in the EU, signaling a global push for more open digital marketplaces. With Apple commanding nearly 60% of the U.S. mobile market and over 62% in Japan, the decision could set off a domino effect worldwide. How does sideloading affect iOS users? Sideloading occurs when…

Read More

Russian Crypto: Why Secret Service Seized Garantex

Russian Crypto: Why Secret Service Seized Garantex

Image: United States Department of Justice The U.S. Secret Service has seized the website of Russian cryptocurrency exchange Garantex, marking a major international crackdown on a platform accused of helping criminals launder billions of dollars in illicit money. In a joint operation involving law enforcement from the U.S., Germany, Finland, Estonia, and other European countries, Garantex’s domains — Garantex.org, Garantex.io, and Garantex.academy — were taken offline and now display a takedown notice from the Secret…

Read More

Women in Cyber Security on the Rise, But Facing More Layoffs and Budget Cuts Than Men

Women in Cyber Security on the Rise, But Facing More Layoffs and Budget Cuts Than Men

Gender diversity in cybersecurity is slowly improving but inequities continue—a new report finds that the field has 5% more women than in 2023, but that they’re more exposed to other workplace challenges than male counterparts. About 32% of women respondents said their organizations experienced security layoffs over the last year compared to just 23% of male respondents. For Women’s History Month this March, ISC2 delved deeper into data collected for its 2024 Cybersecurity Workforce Study….

Read More

Cisco's Vision for Post-Quantum Cryptography: A Secure Future

Cisco's Vision for Post-Quantum Cryptography: A Secure Future

  We are at an inflection point across three vectors: Attackers who are harvesting keys now to decrypt later (HNDL) and unlock sensitive information with the widespread misuse of quantum computing. Quantum computing providers are now out of incubation with plans to scale their data centers and effectively reduce barriers to access these resources. The publication of federal security standards recently released by NIST such as FIPS 203 ML-KEM-1024, provides a cryptographic framework designed to…

Read More

CrowdStrike Security Report: Generative AI Powers Social Engineering Attacks

CrowdStrike Security Report: Generative AI Powers Social Engineering Attacks

Phishing was no longer as common in 2024 as before, according to CrowdStrike’s 2025 Global Threat Report. Threat actors trend toward accessing legitimate accounts through social engineering techniques like voice phishing (vishing), callback phishing, and help desk social engineering attacks. We’re well within the era of what cybersecurity technology CrowdStrike called “the enterprising adversary,” with malware-as-a-service and criminal ecosystems replacing the old-fashioned image of the lone threat actor. Attackers are also using legitimate remote management…

Read More

SonicWall Report: “Threat Actors are Moving at Unprecedented Speeds”

SonicWall Report: “Threat Actors are Moving at Unprecedented Speeds”

SonicWall’s new 2025 Annual Threat Report highlights startling revelations, including that hackers exploited new vulnerabilities within two days 61% of the time, and that it takes the average organization between 120 and 150 days to apply a patch. In addition, the firm’s researchers detected 210,258 “never-before-seen” malware variants in 2024. Researchers reported that, in 2024, the average ransomware payment reached $850,700, with total related losses often exceeding $4.91 million when factoring in downtime and recovery…

Read More

Data Theft Drove 94% of Cyberattacks in 2024

Data Theft Drove 94% of Cyberattacks in 2024

Data theft accounted for 94% of all cyber attacks worldwide in 2024, according to new research, as cybercriminals increasingly combine data exfiltration with encryption in ransomware campaigns. Beyond encryption, ransomware attackers now threaten to leak or sell a company’s data on the dark web if victims refuse to pay. Stolen information often includes personally identifiable data and proprietary intellectual property. The findings come from BlackFog’s 2024 Ransomware Trend Report, which analysed ransomware activity across hundreds…

Read More

$1.5B Hack of Bybit Might Be the Largest Crypto Heist Ever

.5B Hack of Bybit Might Be the Largest Crypto Heist Ever

Following the revelation Friday from cryptocurrency exchange firm Bybit that hackers stole digital tokens worth about $1.5 billion – in what may be the biggest crypto heist of all time – CEO Ben Zhou wrote on X Sunday that it has replenished its reserves. Bybit was able to do this through a mix of emergency loans and large deposits. Zhou told users on Friday that their funds were “safe,” and the firm would refund anyone…

Read More

Google Announces Quantum-Safe Digital Signatures in Cloud KMS

Google Announces Quantum-Safe Digital Signatures in Cloud KMS

Google announced on Thursday the development of quantum-safe digital signatures (FIPS 204/FIPS 205) in Google Cloud Key Management Service (Cloud KMS) for software-based keys. This is available in preview. The search giant also provided a high-level view into its post-quantum strategy for Google Cloud encryption products, including Cloud KMS and the Cloud Hardware Security Module (Cloud HSM). More Google news & tips Mounting concern over public-key cryptography systems This is significant, the company said, because…

Read More
1 2 3 4 28