All Articles (2818)

Sort by

31004537881?profile=RESIZE_400xZorin OS experienced a significant increase in downloads following the release of Windows 10.  Within a two-day stretch, Zorin OS had over 100,000 downloads, which was a record for the distribution.  Meanwhile, Linux Mint has been one of the most popular distributions for some time.  Given that both of these distributions are enjoying a continued rise in popularity, along with the end of Windows 10 support, you might be looking at one or the other to serve as either your first or your next Linux

31007086892?profile=RESIZE_400xAfter years of quiet escalation, business leaders are finally beginning to grasp just how serious the threat of fraud has become.  Today, almost half of all fraud attempts (41%) involve artificial intelligence.  Nowhere is this more evident than in the payments industry.  Fraudsters can use AI to generate convincing fake invoices, purchase orders, and payment instructions that mirror legitimate business documents.  I’ve seen examples that are indistinguishable from the real thing, which is a tre

31006592879?profile=RESIZE_400xWhat is a “honeypot” in the context of cybersecurity?  The term first appeared in the 1980s and 1990s, when it was used to describe precisely that, a honey trap that lured in unsuspecting hackers, putting them on the back foot.  Clifford Stoll’s 1989 book The Cuckoo’s Egg is the first official documentation of a honeypot in the cyber world. Stoll tells the story of using what he called a “honeypot” to find a German hacker who had infiltrated U.S. military computers.  Now the term is used in cybe

31003293698?profile=RESIZE_400xEvery year, the holiday season brings a predictable spike in online activity.  But in 2025, the volume of newly created malicious infrastructure, account compromise activity, and targeted exploitation of e-commerce systems is markedly higher.  Attackers began preparing months in advance, leveraging industrialized tools and services that enable them to scale attacks across multiple platforms, geographies, and merchant categories.

For retailers, financial institutions, and any business operating a

31003290664?profile=RESIZE_400xGet advice and information to help protect your children from dangers lurking in both the online and offline worlds.  Learn how to contact us and report child abductions and sexual exploitation. 

How to report a missing child or online child exploitation - The FBI has jurisdiction to immediately investigate any reported mysterious disappearance or kidnapping involving a child.  Do not wait to report a missing child.  Call your local law enforcement and FBI field office or the closest internation

31004531671?profile=RESIZE_400xOpenAI is alerting some ChatGPT API customers that limited personally identifiable information (PII) was exposed after its third-party analytics provider, Mixpanel, was breached. The compromise, stemming from a smishing campaign detected on 8 November, affected “limited analytics data related to some users of the API”, but did not compromise ChatGPT or other OpenAI products.[1]

While OpenAI confirmed that sensitive information such as credentials, API keys, requests, and usage data, payment and

31003281293?profile=RESIZE_400xAny car dealership is a significant investment.  Not just in terms of financial capital, but also in toil and sweat from the Sales floor to the Dealer Principal’s office.  All of the effort that makes these businesses successful can be neutralized by a single cyber-attack.

CDK has surveyed dealership leadership for five years to understand their approach to cybersecurity and where they see the industry addressing this integral threat to their business.  This year, there are clear indicators that

31003285268?profile=RESIZE_400xAs consumers took advantage of Black Friday and Cyber Monday deals, historical analysis from TransUnion (NYSE: TRU) and found that 4.6% of attempted ecommerce transactions globally were suspected of being digital fraud from this Thanksgiving to Cyber Monday.  Based on insights from TransUnion’s intelligence network, TransUnion found that the global suspected Digital Fraud rate “was down from 6.0% during the same period in 2023.”[1]

For attempted ecommerce transactions where the consumer was in t

31003293498?profile=RESIZE_400xThe automobile dealership sector continues to evolve digitally with connected vehicles, cloud-based dealership management systems (DMS), online financing, and electronic sales workflows. But the newly released CDK State of Dealership Cybersecurity 2025 report shows a sector still struggling to keep pace with threat actors who increasingly target these high-value, high-data retail environments.   Despite gains in awareness and investment, dealerships face widening gaps in employee readiness, thir

31003287685?profile=RESIZE_400xThe cyber threat landscape is constantly evolving, but few threats demand immediate, sector-wide attention like the latest joint advisory on the Akira ransomware.    The US Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and international partners recently issued a crucial advisory (AA24-109A) detailing the tactics, techniques, and procedures (TTPs) of the Akira ransomware group.  Their accompanying press release highlighted the need for decisi

31003172461?profile=RESIZE_400xOn the surface, the Superbox media streaming devices for sale at retailers like BestBuy and Walmart may seem like a steal: They offer unlimited access to more than 2,200 pay-per-view and streaming services like Netflix, ESPN and Hulu, all for a one-time fee of around $400. But security experts warn these TV boxes require intrusive software that forces the user’s network to relay Internet traffic for others, traffic that is often tied to cybercrime activity such as advertising fraud and account t

31002993088?profile=RESIZE_400xA China-linked hacking group known as APT31 has infiltrated Russia’s technology sector for years and quietly exfiltrated data from companies involved in government contracting and systems integration, according to a new report.  The campaign, which ran into this year, was “well-planned” and allowed intruders to remain undetected, Russian cybersecurity firm Positive Technologies said in research published on last week. 

Public reports of Chinese cyber operations against Russia are rare, given the

31003146095?profile=RESIZE_400xIf you manage Facebook advertising for a small or medium-sized business, open your inbox with suspicion, because attackers have been sending highly convincing invites that appear to come straight from Meta.

Researchers at Check Point found that the attackers used Facebook Business pages and the platform’s invitation feature to send messages that appear to come from the real @facebookmail.com domain, making them much harder to spot with automated filters and human instincts alike.[1]

The campaign

31002974679?profile=RESIZE_400xFor cybersecurity professionals in the financial services sector, the pressure is relentless.  It is not just the external threat actors; it is the mounting, overlapping demands from regulators that are taxing resources, draining budgets, and leading to what is now officially recognized as compliance fatigue.  The Chief Financial Officer (CFO) is, understandably, under pressure and stressed.

The new Omega Systems Regulatory Pressure & Compliance Fatigue in Financial Services report offers a cruc

31000311692?profile=RESIZE_400xA data broker that is owned by major airlines will stop selling hundreds of millions of customer travel records to government agencies in the coming weeks.  News that the Airlines Reporting Corporation (ARC) will shut down its controversial Travel Intelligence Program (TIP) surfaced in a letter ARC CEO Lauri Reishus recently sent to a bipartisan group of lawmakers.

The Travel Intelligence Program (TIP) was a data initiative operated by ARC, a company owned by major airlines.  Through TIP, ARC ag

30989176054?profile=RESIZE_400xEuropol's Internet Referral Unit (EU IRU) says a 13 November operation across gaming and "gaming-adjacent" services led its partners to report thousands of URLs hosting terrorist and hate-fueled material, including 5,408 links to jihadist content, 1,070 pushing violent right-wing extremist or terrorist propaganda, and 105 tied to racist or xenophobic groups.[1]

The sweeps formed part of a coordinated "Referral Action Day" involving multiple partner countries and marked the IRU's most explicit fo

31000889871?profile=RESIZE_400xThe quantum technology landscape is rapidly evolving from speculative science to a tangible economic powerhouse, with experts forecasting a market worth up to $97 billion by 2035.  According to a major McKinsey report, quantum computing, communication, and sensing could generate as much as $97 billion in global revenue within a decade, making 2025 a pivotal year in the transition from concept to deployment.  McKinsey's analysis highlights a decisive shift in 2024, in which the focus shifted from

30991477489?profile=RESIZE_400xAs cyber threats continue to evolve, car dealerships remain vulnerable despite growing awareness and investment. CDK’s State of Dealership Cybersecurity 2025 study reveals that while 90% of dealership leaders recognize the importance of cybersecurity protocols, fewer than half feel confident in their systems’ ability to protect against attacks.

Key insights from this year’s report include:

  • Cyberattack Trends: One in five dealerships reported being targeted in 2025, with phishing and ransomware

31000257291?profile=RESIZE_400xOn 18 November 2025 at 11:20 UTC, Cloudflare's network began experiencing significant failures to deliver core network traffic.  This showed up to Internet users trying to access its customers' sites as an error page indicating a failure within Cloudflare's network.

According to researchers Matthew Prince, the issue was not caused, directly or indirectly, by a cyber-attack or malicious activity of any kind.  Instead, it was triggered by a change to one of its database systems' permissions which

30999073457?profile=RESIZE_400xSentinelLABS has provided yet another expert analysis.  Tracking threat actor infrastructure has become increasingly complex.  Modern adversaries rotate domains, reuse hosting, and replicate infrastructure templates across operations, making it difficult to connect isolated indicators to broader activity.  Checking an IP address, a domain, or a certificate in isolation often yields little value when adversaries hide behind short-lived domains and churned TLS certificates.  As a result, analysts