IT system supplier cyberattack impacts 200 municipalities in Sweden
A cyberattack on Miljödata, an IT systems supplier for roughly 80% of Sweden's municipal systems, has caused accessibility problems in more than 200 regions of the country.
Global Salt Typhoon hacking campaigns linked to Chinese tech firms
The U.S. National Security Agency (NSA), the UK's National Cyber Security Centre (NCSC), and partners from over a dozen countries have linked the Salt Typhoon global hacking campaigns to three China-based technology firms.
Storm-0501’s evolving techniques lead to cloud-based ransomware
Financially motivated threat actor Storm-0501 has continuously evolved their campaigns to achieve sharpened focus on cloud-based tactics, techniques, and procedures (TTPs). While the threat actor has been known for targeting hybrid cloud environments, their primary objective has shifted from deploying on-premises endpoint ransomware to using cloud-based ransomware tactics.
Google to verify all Android devs to protect users from malware
Google is introducing a new defense for Android called 'Developer Verification' to block malware installations from sideloaded apps sourced from outside the official Google Play app store.
Microsoft details Storm-0501’s focus on ransomware in the cloud | CyberScoop
The financially motivated threat group demonstrates deep knowledge of hybrid cloud environments, which allows it to rapidly steal sensitive data, destroy backups and encrypt systems for ransomware.
Hackers use fake NDAs to deliver malware to US manufacturers
Hackers are targeting American industrial firms by contacting them through their website forms, posing as potential business partners before infecting them with malware.
Attention, cet outil très populaire peut devenir un mouchard pour localiser les Tesla
Dans l’écosystème Tesla, il existe une solution qui assouvit la soif toujours plus grande de certains propriétaires en données sur leur précieux véhicule. Son nom ? TeslaMate, un outil open source capable d'enregistrer l’historique de trajets, l’état de la batterie mais également de révéler des données sensibles à la
Over 28,000 Citrix devices vulnerable to new exploited RCE flaw
More than 28,200 Citrix instances are vulnerable to a critical remote code execution vulnerability tracked as CVE-2025-7775 that is already being exploited in the wild.
Allied spy agencies blame 3 Chinese tech companies for Salt Typhoon attacks
The three companies were accused of providing “cyber-related products and services to China’s intelligence services, including multiple units in the People’s Liberation Army and Ministry of State Security” since at least 2021, according to the advisory.
Nevada “Network Security Incident” Shuts Down State Offices and Services
The Office of the Governor of Nevada revealed that the incident has shut down in-person State services, while government phone lines and websites are offline
Automatiser votre travail, vous en rêviez ? Ce ransomware boosté à l'IA l'a fait - Numerama
Dans un article publié le 26 août 2025, les chercheurs d'ESET révèlent une découverte pour le moins perturbante. Derrière le nom « PromptLock » se cache un malware capable de générer son propre code malveillant et de s’adapter en temps réel à l’environnement ciblé, le tout grâce à l'IA. Faisons-nous face au tout
Spanish police arrest student suspected of hacking school system to change grades
Spanish police have arrested a university student suspected of hacking the local government’s education management system to alter grades and gain access to professors’ emails.
Why zero trust is never 'done' and is an ever-evolving process
Zero trust isn't a project you finish—it's a cycle that keeps evolving. From supply chain exploits to policy drift, resilience requires continuous testing and adaptation. Learn how Specops Software supports this journey with tools that make it easier.
Framework to Protect Digital Identities in Agentic AI | CSA
The Digital Identity Rights Framework safeguards digital identities in AI environments by integrating legal & technical controls that ensure traceability.
From international conflicts and cyber warfare to tariffs and trade protectionism, today’s geopolitical landscape is creating unprecedented challenges for global supply chains. These forces directly affect material costs, logistics and overall operational stability, leaving companies to navigate increasing uncertainty. Now more than ever, leaders must understand how national security concerns and international politics can quickly....