Multi-Job Hustles Expose Workers to Higher Cybersecurity Risks
Almost half of Gen Z has a side hustle, the highest percentage of any other generation. This may leave them at higher risk of cyberattacks.
Almost half of Gen Z has a side hustle, the highest percentage of any other generation. This may leave them at higher risk of cyberattacks.
Malware isn’t just trying to hide anymore—it’s trying to belong. We’re seeing code that talks like us, logs like us, even documents itself like a helpful teammate. Some threats now look more like developer tools than exploits. Others borrow trust from open-source platforms, or quietly build themselves out of AI-writtenRead More »⚡ Weekly Recap: VPN 0-Day, Encryption Backdoor, AI Malware, macOS Flaw, ATM Hack & More
Forty-four cybersecurity merger and acquisition (M&A) deals were announced in July 2025. The post Cybersecurity M&A Roundup: 44 Deals Announced in July 2025 appeared first on SecurityWeek.
An Arizona woman was sentenced to eight-and-a-half years in prison for her role helping North Korean workers infiltrate US companies by pretending to be US workers. From an article: According to court documents, Chapman hosted the North Korean IT workers’ computers in her own home between October 2020 and OctoberRead More »First Sentencing in Scheme to Help North Koreans Infiltrate US Companies
Some of the most devastating cyberattacks don’t rely on brute force, but instead succeed through stealth. These quiet intrusions often go unnoticed until long after the attacker has disappeared. Among the most insidious are man-in-the-middle (MITM) attacks, where criminals exploit weaknesses in communication protocols to silently position themselves between twoRead More »Man-in-the-Middle Attack Prevention Guide
Northwest Radiologists says the personal information of 350,000 Washington State residents was stolen in a January 2025 data breach. The post Northwest Radiologists Data Breach Impacts 350,000 Washingtonians appeared first on SecurityWeek.
Everyone’s an IT decision-maker now. The employees in your organization can install a plugin with just one click, and they don’t need to clear it with your team first. It’s great for productivity, but it’s a serious problem for your security posture. When the floodgates of SaaS and AI opened,Read More »The Wild West of Shadow IT
Attackers could silently modify sensitive MCP files to trigger the execution of arbitrary code without requiring user approval. The post Several Vulnerabilities Patched in AI Code Editor Cursor appeared first on SecurityWeek.
Illumina will pay $9.8 million to settle accusations that products provided to the US government were affected by cybersecurity flaws. The post Gene Sequencing Giant Illumina Settles for $9.8M Over Product Vulnerabilities appeared first on SecurityWeek.
Cybersecurity researchers have discovered a nascent Android remote access trojan (RAT) called PlayPraetor that has infected more than 11,000 devices, primarily across Portugal, Spain, France, Morocco, Peru, and Hong Kong. “The botnet’s rapid growth, which now exceeds 2,000 new infections per week, is driven by aggressive campaigns focusing on SpanishRead More »PlayPraetor Android Trojan Infects 11,000+ Devices via Fake Google Play Pages and Meta Ads