Man jailed for teaching criminals how to use malware
Regular readers of Hot for Security will have read plenty of articles about cybercriminals who have created malware, or malicious...
Regular readers of Hot for Security will have read plenty of articles about cybercriminals who have created malware, or malicious...
On this week’s show we learn that AI really can be a stalker’s best friend, as we explore a strange...
By Byron V. Acohido This is the third installment in our four-part 2025 Year-End Roundtable. In Part One, we explored...
Navigating the Most Complex Regulatory Landscapes in Cybersecurity Financial services and healthcare organizations operate under the most stringent regulatory frameworks...
The cybersecurity battlefield has changed. Attackers are faster, more automated, and more persistent than ever. As businesses shift to cloud,...
Launching an AI initiative without a robust data strategy and governance framework is a risk many organizations underestimate. Most AI...
Enterprises leveraging our rapidly digitizing world must also have a robust understanding of how cyber threats are evolving. AI deepfakes...
One startup, Internet Backyard, allows data center providers to provide real-time quotes, billing, payments, and reconciliation for GPU capacity. The white-label...
Rachid ‘Rush’ Wehbi, CEO of e-commerce platform Sell The Trend, has tested GPT-5.2 under real-world conditions. “GPT-5.2 is doing a...
Dec 15, 2025Ravie LakshmananHacking News / Cybersecurity If you use a smartphone, browse the web, or unzip files on your...
In early December 2025, security researchers exposed a cybercrime campaign that had quietly hijacked popular Chrome and Edge browser extensions...
Dec 15, 2025Ravie LakshmananMalware / Cybercrime Cybersecurity researchers have disclosed details of an active phishing campaign that's targeting a wide...
Dec 15, 2025Ravie LakshmananRansomware / Cybercrime The pro-Russian hacktivist group known as CyberVolk (aka GLORIAMIST) has resurfaced with a new...
Dec 13, 2025Ravie LakshmananNetwork Security / Vulnerability The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a high-severity...
SHADOW-VOID-042 Targets Multiple Industries with Void Rabisu-like Tactics | Trend Micro (US) Content has been added to your Folio Go...
Subscribe To InfoSec Today News