“Cyber warfare is as much about psychological strategy as technical prowess.”
― James Scott
-
How to build a cybersecurity culture across your business
As a company’s cyber-risks evolve, so must its culture. Follow these tips to create a strong cybersecurity culture that helps protect your organization from cyberthreats.Read More
-
CISA Adds Citrix NetScaler CVE-2025-5777 to KEV Catalog as Active Exploits Target Enterprises [email protected] (The Hacker News)
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a critical security flaw impacting Citrix NetScaler ADC and Gateway to its Known Exploited Vulnerabilities (KEV) catalog, officially confirming the vulnerability has been weaponized in the wild. The shortcoming in question is CVE-2025-5777 (CVSS score: 9.3), an instance of insufficient input validation thatRead More
-
Critical mcp-remote Vulnerability Enables Remote Code Execution, Impacting 437,000+ Downloads [email protected] (The Hacker News)
Cybersecurity researchers have discovered a critical vulnerability in the open-source mcp-remote project that could result in the execution of arbitrary operating system (OS) commands. The vulnerability, tracked as CVE-2025-6514, carries a CVSS score of 9.6 out of 10.0. “The vulnerability allows attackers to trigger arbitrary OS command execution on the machine running mcp-remote when itRead…
-
Fake Gaming and AI Firms Push Malware on Cryptocurrency Users via Telegram and Discord [email protected] (The Hacker News)
Cryptocurrency users are the target of an ongoing social engineering campaign that employs fake startup companies to trick users into downloading malware that can drain digital assets from both Windows and macOS systems. “These malicious operations impersonate AI, gaming, and Web3 firms using spoofed social media accounts and project documentation hosted on legitimate platforms like…
-
CISO’s guide to creating a cybersecurity board report
An effective cybersecurity board report influences executive decision-making at the highest levels. Learn how to write a report that resonates with corporate directors.Read More
-
Four Arrested in £440M Cyber Attack on Marks & Spencer, Co-op, and Harrods [email protected] (The Hacker News)
The U.K. National Crime Agency (NCA) on Thursday announced that four people have been arrested in connection with cyber attacks targeting major retailers Marks & Spencer, Co-op, and Harrods. The arrested individuals include two men aged 19, a third aged 17, and a 20-year-old woman. They were apprehended in the West Midlands and London on…
-
What Security Leaders Need to Know About AI Governance for SaaS [email protected] (The Hacker News)
Generative AI is not arriving with a bang, it’s slowly creeping into the software that companies already use on a daily basis. Whether it is video conferencing or CRM, vendors are scrambling to integrate AI copilots and assistants into their SaaS applications. Slack can now provide AI summaries of chat threads, Zoom can provide meeting…
-
New ZuRu Malware Variant Targeting Developers via Trojanized Termius macOS App [email protected] (The Hacker News)
Cybersecurity researchers have discovered new artifacts associated with an Apple macOS malware called ZuRu, which is known to propagate via trojanized versions of legitimate software. SentinelOne, in a new report shared with The Hacker News, said the malware has been observed masquerading as the cross‑platform SSH client and server‑management tool Termius in late May 2025.…
-
AMD Warns of New Transient Scheduler Attacks Impacting a Wide Range of CPUs [email protected] (The Hacker News)
Semiconductor company AMD is warning of a new set of vulnerabilities affecting a broad range of chipsets that could lead to information disclosure. The attacks, called Transient Scheduler Attacks (TSA), manifests in the form of a speculative side channel in its CPUs that leverages execution timing of instructions under specific microarchitectural conditions. “In some cases,…
-
What CISOs need to know about AI governance frameworks
AI offers business benefits but poses legal, ethical and reputational risks. Governance programs manage these risks while ensuring responsible use and regulatory compliance.Read More
“Security used to be an inconvenience sometimes, but now it’s a necessity all the time.”
― Martina Navratilova