RansomwareFog ransomware uses legit monitoring software, open-source toolsSteve ZurierJune 12, 2025The bad actor also established persistence following the incident.
Vulnerability ManagementUpdates urged after disclosure of Windows Secure Boot vulnerabilityShaun NicholsJune 12, 2025Bug potentially allows an attacker to bypass the UEFI checks that prevents the use of unauthorized firmware.
AI/MLMicrosoft 365 Copilot ‘zero-click’ vulnerability enabled data exfiltrationLaura FrenchJune 11, 2025An attacker could have sent an email causing Copilot to leak info via a markdown image.
Endpoint/Device Security40,000 security cameras exposed, raises espionage concernsSteve ZurierJune 11, 2025The open cameras may cause unauthorized access at data centers, break-ins at offices and retail stores, and privacy issues for home users and employees.
AI/MLOpenAI bans ChatGPT accounts linked to state-sponsored threat activityShaun NicholsJune 11, 2025OpenAI bans ChatGPT accounts linked to threat actors in China, Russia, Iran and North Korea.
Security Strategy, Plan, BudgetOverconfidence in security could put healthcare organizations at riskShaun NicholsJune 11, 2025Despite respondents saying they're prepared for a cyberattack, it's a false sense of security, says IT services provider.
Network SecurityMicrosoft fixes 66 bugs in latest Patch Tuesday, 10 rated ‘critical’Shaun NicholsJune 10, 2025Two of the flaws have a CVSS score of 8.8, with one under active exploitation.
Network SecurityThousands of organizations at risk by Salesforce Industry Cloud bugsSteve ZurierJune 10, 2025Five zero-days, 15 misconfigurations could impact businesses using Salesforce services.
PhishingFacebook malvertising reveals 4K domains spoofing 68 brandsLaura FrenchJune 10, 2025The Meta Ad Library does not retain all inactive ads, hindering analysis.
IdentityTrump executive order alters Biden-era cybersecurity regulationsShaun NicholsJune 10, 2025Order could have a ripple effect on private-sector identity management for contractors.