Security Threats and Information
WeLiveSecurity
- Preventing business disruption and building cyber-resilience with MDR 09.09.2025
- Under lock and key: Safeguarding business data with encryption 05.09.2025
- GhostRedirector poisons Windows servers: Backdoors with a side of Potatoes 04.09.2025
- This month in security with Tony Anscombe – August 2025 edition 28.08.2025
- Don’t let “back to school” become “back to (cyber)bullying” 27.08.2025
- First known AI-powered ransomware uncovered by ESET Research 26.08.2025
- "What happens online stays online" and other cyberbullying myths, debunked 21.08.2025
- The need for speed: Why organizations are turning to rapid, trustworthy MDR 19.08.2025
- Investors beware: AI-powered financial scams swamp social media 18.08.2025
- Supply-chain dependencies: Check your resilience blind spot 12.08.2025
Krebs on Security
- Microsoft Patch Tuesday, September 2025 Edition 09.09.2025
- 18 Popular Code Packages Hacked, Rigged to Steal Crypto 08.09.2025
- GOP Cries Censorship Over Spam Filters That Work 06.09.2025
- The Ongoing Fallout from a Breach at AI Chatbot Maker Salesloft 01.09.2025
- Affiliates Flock to ‘Soulless’ Scam Gambling Machine 28.08.2025
- DSLRoot, Proxies, and the Threat of ‘Legal Botnets’ 26.08.2025
- SIM-Swapper, Scattered Spider Hacker Gets 10 Years 21.08.2025
- Oregon Man Charged in ‘Rapper Bot’ DDoS Service 19.08.2025
- Mobile Phishers Target Brokerage Accounts in ‘Ramp and Dump’ Cashout Scheme 15.08.2025
- Microsoft Patch Tuesday, August 2025 Edition 12.08.2025