May 20, 2025 | Podcast
https://www.verizon.com/business/resources/reports/dbir Verizon’s 2025 Data Breach Investigations Report (DBIR) paints a concerning picture of today’s cybersecurity landscape, with third-party involvement in breaches doubling to 30% and vulnerability...
May 19, 2025 | Podcast
https://www.oaic.gov.au/privacy/notifiable-data-breaches/notifiable-data-breaches-publications/notifiable-data-breaches-report-july-to-december-2024 The Australian healthcare sector has emerged as the leading source of notifiable data breaches in the second half of...
May 17, 2025 | Podcast
Uncovering Actor TTP Patterns and the Role of DNS in Investment Scams Cybersecurity researchers have uncovered two threat actor groups, codenamed Reckless Rabbit and Ruthless Rabbit, orchestrating elaborate investment scams through fake celebrity endorsements and...
May 16, 2025 | Podcast
https://blog.google/technology/safety-security/how-were-using-ai-to-combat-the-latest-scams Google has unveiled a new suite of artificial intelligence-powered security features designed to protect users from evolving online scams across its Chrome browser, Search...
May 15, 2025 | Podcast
https://www.morphisec.com/blog/new-noodlophile-stealer-fake-ai-video-generation-platforms Cybersecurity researchers have discovered a sophisticated malware campaign using fake artificial intelligence tools to distribute an information-stealing malware called...
May 14, 2025 | Podcast
https://socket.dev/blog/malicious-npm-packages-hijack-cursor-editor-on-macos Security researchers have uncovered a sophisticated attack targeting users of Cursor, a popular AI-powered code editor for macOS. Three malicious npm packages, which remain available for...