Tuesday, September 16, 2025

Cybersecurity

Hackers Exploit Official Company Documents to Spread Malware

Cybercriminals have found a new way to exploit trust, using official company documents to trick users into downloading malware. This alarming discovery was unveiled by...

NordLayer Introduces Malware Detection Tool to Protect Businesses from Cyber Threats

NordLayer, a leading provider of secure remote access and encrypted connections, has unveiled a new feature called Download Protection. This tool is designed to...

T-Mobile Admits Chinese Hackers Accessed Network, But Call Logs Remain Safe

T-Mobile has confirmed that Chinese hackers recently targeted its infrastructure, but assured customers that no sensitive data, including call logs, was compromised. The incident, which...

Ford Denies Data Breach Allegations: Customer Information Secure

Ford Motor Company has firmly dismissed claims of a recent data breach, stating that its systems and customer data remain uncompromised. The alleged breach, which...

Maxar Data Breach Exposes Sensitive Employee Information

A recent cyberattack targeting Maxar Space Systems has compromised sensitive personal information of employees, as revealed in a filing with the California Attorney General. The...

North Korean Hackers Target macOS Users with Flutter-Based Malware in New Cybersecurity Experiment

Cybersecurity researchers at Jamf have uncovered a unique and experimental malware targeting macOS users, which they believe was developed by North Korean state-sponsored hackers. This...

7 Common Email Security Myths You Need to Stop Believing

Email is one of the most common ways we connect online, both at work and in our personal lives. But with its everyday use...

AWS Credential Theft Through Malicious PyPI Package ‘Fabrice’ with Thousands of Downloads

A recently discovered malicious package hiding within the Python Package Index (PyPI) has been silently stealing AWS credentials for years, exposing thousands of developers...