Google Warns of New Campaign Targeting BPOs to Steal Corporate Data
A financially motivated threat actor, UNC6783, targets BPO organizations to steal sensitive data from high-value companies using social engineering and phishing tactics.
Google Warns of New Campaign Targeting BPOs to Steal Corporate Data
A financially motivated threat actor, UNC6783, targets BPO organizations to steal sensitive data from high-value companies using social engineering and phishing tactics.
They Knew, They Didn't Care, & We Are All Paying For It
Social media platforms like Instagram have been found liable for mental health damage to young users, with internal documents revealing harmful strategies targeting teens.
Psychology says people who never post on social media but check it every day aren't passive - they opted out of the performance while keeping the window, and keeping the window without paying the price is the most rational position available and the one the platform was specifically designed to make feel antisocial - Silicon Canals
Silent scrollers on social media actively choose to observe rather than post, demonstrating discipline and self-control contrary to common perceptions.
They Knew, They Didn't Care, & We Are All Paying For It
Social media platforms like Instagram have been found liable for mental health damage to young users, with internal documents revealing harmful strategies targeting teens.
Psychology says people who never post on social media but check it every day aren't passive - they opted out of the performance while keeping the window, and keeping the window without paying the price is the most rational position available and the one the platform was specifically designed to make feel antisocial - Silicon Canals
Silent scrollers on social media actively choose to observe rather than post, demonstrating discipline and self-control contrary to common perceptions.
Capita's pension portal exposes civil servants' private data
Capita limited online functionality of the Civil Service Pensions Scheme member portal after a data breach exposed personal information of public sector workers.
Hackers steal and leak sensitive LAPD police documents | TechCrunch
Cybercriminals leaked sensitive LAPD documents online, including personnel files and internal investigations, allegedly by the extortion gang World Leaks.
Capita's pension portal exposes civil servants' private data
Capita limited online functionality of the Civil Service Pensions Scheme member portal after a data breach exposed personal information of public sector workers.
Hackers steal and leak sensitive LAPD police documents | TechCrunch
Cybercriminals leaked sensitive LAPD documents online, including personnel files and internal investigations, allegedly by the extortion gang World Leaks.
Apple Intelligence AI Guardrails Bypassed in New Attack
Researchers have successfully bypassed Apple's AI safety protocols using adversarial techniques, allowing for the execution of arbitrary tasks and manipulation of private data.
Apple Intelligence AI Guardrails Bypassed in New Attack
Researchers have successfully bypassed Apple's AI safety protocols using adversarial techniques, allowing for the execution of arbitrary tasks and manipulation of private data.
Behind The Unbelievable True Story Of A Forgotten Phone Hacker
Rachael Morrison created a documentary about Joybubbles, a pioneering phone hacker, to highlight his forgotten contributions to technology and culture.
Guest Idea: Why Sustainable Home Tech Choices Also Need Cybersecurity Awareness
Sustainable technology adoption is rising, but security risks of connected devices are often overlooked, impacting both environmental and digital safety.
Cookie banners have become bloated and useless, creating a new kind of interaction that means trouble all over the web. The only solution is to get rid of them, and do it now.
Credential incidents cause significant operational costs and disruptions, impacting IT teams and overall business productivity beyond just breach prevention.
ThreatsDay Bulletin: Hybrid P2P Botnet, 13-Year-Old Apache RCE and 18 More Stories
A new variant of the Phorpiex botnet combines traditional and peer-to-peer communication, facilitating sophisticated malware operations and high-volume spam.
Anthropic's Claude Mythos Finds Thousands of Zero-Day Flaws Across Major Systems
Anthropic's Project Glasswing uses Claude Mythos to identify and address cybersecurity vulnerabilities, surpassing human capabilities in some instances.
The Evolving Landscape of Privacy and Cybersecurity: Essential Strategies for Legal and Compliance Professionals - MedCity News
Organizations must combine strong controls with comprehensive employee training and accountability culture to effectively protect sensitive data and comply with evolving privacy laws.
Personal cybersecurity responsibility is essential as cybercrime costs billions annually, with social media amplifying vulnerabilities through voluntary data sharing and AI-enabled threat analysis.
Personal cybersecurity responsibility is essential as cybercrime costs billions annually, with social media amplifying vulnerabilities through voluntary data sharing and AI-enabled threat analysis.
World Cloud Security Day: Breaking Down the State of the Cloud Cybersecurity and Physical Security
"World Cloud Security Day is a useful reminder to recognize how much cloud risk now comes down to everyday access decisions and overlooked misconfigurations," says James Maude, Field CTO at BeyondTrust.
Mobile Attack Surface Expands as Enterprises Lose Control
Mobile device security is inadequate, with many organizations using critically outdated operating systems and exposing sensitive data to potential attacks.
Modern cyberattacks combine psychological manipulation, deepfakes, voice phishing, and stolen data to breach even well-defended organizations without exploiting software vulnerabilities.
418 publicly announced law enforcement actions (2021–mid-2025) compiled into a standardized dataset detailing action types, targeted cybercrimes, and enforcement outcomes.