Thai law enforcement on Saturday reportedly confiscated 38 Starlink satellite internet transmitters allegedly intended to be used in scam compounds in Myanmar.
News alert: Arsen introduces new AI-based phishing tests to improve social engineering resilience - The Last Watchdog
Paris, France, Mar. 24, 2025, CyberNewswire -- Arsen, a leading cybersecurity company specializing in social engineering defense, today announced the full release of Conversational Phishing, a groundbreaking feature embedded in its phishing simulation platform. This AI-powered tool introduces dynamic, adaptive phishing conversations to train employees against evolving threats more effectively than ever before. Advanced phishing
News alert: INE Security spotlights healthcare companies facing rising exposure to costly breaches - The Last Watchdog
Cary, NC, Mar. 24, 2025, CyberNewswire -- INE Security, a global provider of cybersecurity training and certification, today announced its initiative to spotlight the increasing cyber threats targeting healthcare institutions. In recognition of National Physicians Week 2025, the company is drawing attention to new industry data showing a sharp rise in cyberattacks on hospitals and
Hackers steal sensitive data from Pennsylvania county during ransomware attack
The government of Union County in central Pennsylvania said a recent ransomware attack exposed information related to law enforcement and other government business.
DrayTek routers worldwide go into reboot loops over weekend
Many Internet service providers (ISPs) worldwide are alerting customers of an outage that started Saturday night and triggered DrayTek router connectivity problems.
Cyberattack takes down Ukrainian state railway’s online services
Ukrzaliznytsia, Ukraine's national railway operator, has been hit by a massive cyberattack that disrupted online services for buying tickets both through mobile apps and the website.
Over 300 arrested in international crackdown on cyber scams
Law enforcement agencies in seven African countries arrested over 300 suspected cybercriminals involved in mobile banking, investment and messaging app scams, according to a statement on Monday by Interpol.
Chinese Weaver Ant hackers spied on telco network for 4 years
A China-linked advanced threat group named Weaver Ant spent more than four years in the network of a telecommunications services provider, hiding traffic and infrastructure with the help of compromised Zyxel CPE routers.
Microsoft unveils Microsoft Security Copilot agents and new protections for AI
Learn more about the next evolution of Security Copilot with AI agents designed to autonomously assist with phishing, data security, and identity management.
Microsoft intègre des agents IA à son offre Security Copilot
Microsoft veut appliquer le potentiel des agents IA à la cybersécurité, domaine particulièrement touché par le manque de main d'œuvre....-Intelligence artificielle
Hidden Threats: How Microsoft 365 Backups Store Risks for Future Attacks
Acronis Threat Research found 2M+ malicious URLs & 5,000+ malware instances in Microsoft 365 backup data—demonstrating how built-in security isn't always enough. Don't let threats persist in your cloud data. Strengthen your defenses.
Critical flaw in Next.js lets hackers bypass authorization
A critical severity vulnerability has been discovered in the Next.js open-source web development framework, potentially allowing attackers to bypass authorization checks.
Police arrests 300 suspects linked to African cybercrime rings
African law enforcement authorities have arrested 306 suspects as part of 'Operation Red Card,' an INTERPOL-led international crackdown targeting cross-border cybercriminal networks.
Le fournisseur de tests ADN 23andMe dépose le bilan, sa CEO démissionne
La société américaine spécialisée dans les tests ADN récréatifs a été affaiblie ces derniers temps par une baisse des commandes et...-Biotech
Threat Modeling OpenAI's Responses API with MAESTRO | CSA
Traditional threat modeling falls short when it comes to AI agents. Enter the MAESTRO framework, a 7-layer threat modeling approach designed for agentic AI.
How Can Organizations Secure Hybrid Work Environments? | CSA
Hybrid work expands cyber risks. Organizations must use Zero Trust, MFA, endpoint security, and secure collaboration tools to protect data and maintain productivity.