6 Google Chrome Extensions Expose User Information Jordyn Alger June 10, 2025 Research reveals 6 widely used Google Chrome extensions unintentionally transmit user data over simple HTTP. Read More
Harris-Walz Campaign Possibly Targeted in iPhone Cyberattack Security Staff June 9, 2025 A cybersecurity firm believes an iPhone hacking campaign occurred and targeted 5 high-profile Americans. Read More
84% of Organizations Are Now Using AI in the Cloud Security Staff June 9, 2025 Orca Security recently released the 2025 State of Cloud Security Report, finding that 84% of organizations now use AI in the cloud, and 62% of organizations have at least one vulnerable AI package.Read More
Vulnerability Impacts Various Cloud Deployments of Cisco ISE Jordyn Alger June 9, 2025 A Cisco vulnerability could affect cloud deployments of Cisco Identity Services Engine (ISE) in certain systems. Read More
IT Support Impersonated in Voice Phishing Campaign Jordyn Alger June 6, 2025 An observed voice phishing campaign is impersonating IT support workers. Read More
71% of Organizations Cannot Cover the Cloud Environment With Current Tools Jordyn Alger June 6, 2025 As cloud infrastructure increases in complexity, security teams are having difficulty keeping pace. Read More
Why Are Cyberattacks Targeting Retail? Experts Share Their Thoughts Jordyn Alger June 5, 2025 Harrods, Marks & Spencer, Adidas and more — why are retailers facing this wave of cyberattacks in recent months? Read More
2 Certificate Authorities Now Distrusted by Google — Due to Compliance Issues Jordyn Alger June 5, 2025 Security leaders share their thoughts on the importance of compliance and trust for certificate authorities. Read More
Oxford University Launches Its First MBA Cyber Resilience Elective Security Staff June 3, 2025 The University of Oxford has introduced its first cyber resilience elective. Read More
78% of Security Leaders Say Tool Sprawl Challenges Threat Mitigation Security Staff June 3, 2025 A recent Barracuda Networks survey found that 65% of IT and security professionals say their organizations are juggling too many security tools. Read More