The most notorious and damaging ransomware of all time

How it works: Egregor follows the “double extortion” trend of both encrypting data and threatening to leak sensitive information if the ransom is not paid. Its codebase is relatively sophisticated and able to avoid detection by using obfuscation and anti-analysis techniques.  Targeted victims: As of late November, Egregor victimized at least 71 organizations across 19 industries worldwide. […]

The most notorious and damaging ransomware of all time

How it works: Egregor follows the “double extortion” trend of both encrypting data and threatening to leak sensitive information if the ransom is not paid. Its codebase is relatively sophisticated and able to avoid detection by using obfuscation and anti-analysis techniques.  Targeted victims: As of late November, Egregor victimized at least 71 organizations across 19 industries worldwide. […]

New Microsoft 365 Phishing Scam Tricks Users Into Calling Fake Support

Cybersecurity company Guardz is warning Microsoft 365 users about a new phishing scam backed by social engineering tactics making the rounds. This isn’t an average scam as attackers trick people into calling fake support numbers using Microsoft 365 infrastructure, putting their login details and accounts at risk. How the Attack Works Unlike typical phishing attempts […]

AI Chatbot DeepSeek R1 Can Be Manipulated to Create Malware

Tenable Research reveals that AI chatbot DeepSeek R1 can be manipulated to generate keyloggers and ransomware code. While not fully autonomous, it provides a playground for cybercriminals to refine and exploit its capabilities for malicious purposes. A new analysis from cybersecurity firm Tenable Research reveals that the open-source AI chatbot DeepSeek R1 can be manipulated […]

Best Arctic Wolf Competitors & Alternatives in 2025

Managed security services like Arctic Wolf and its competitors help companies boost cybersecurity without the hassle of an in-house IT team. It’s a practical way to stay secure while focusing on your core business. Arctic Wolf is popular, but many other MDR providers offer excellent features and services. Here are nine top Arctic Wolf alternatives […]

CYREBRO’s AI-Native MDR Platform Earns Silver at the 2025 Globee Cybersecurity Awards

Tel Aviv, Israel, March 12th, 2025, CyberNewsWire CYREBRO, the AI-native Managed Detection and Response (MDR) solution, announced today that it won Silver in the category of Security Operations Center (SOC) solutions at the annual 2025 Globee Awards. The program aims to raise awareness about cybersecurity issues and honor those who have made significant contributions in […]

GitLab addressed critical auth bypass flaws in CE and EE)

GitLab addressed critical auth bypass flaws in CE and EE Pierluigi Paganini March 13, 2025 GitLab addressed two critical authentication bypass vulnerabilities in Community Edition (CE) and Enterprise Edition (EE). GitLab released security updates to address critical vulnerabilities in Community Edition (CE) and Enterprise Edition (EE). The company addressed nine vulnerabilities, including the two critical […]

Best Arctic Wolf Competitors & Alternatives in 2025

Managed security services like Arctic Wolf and its competitors help companies boost cybersecurity without the hassle of an in-house IT team. It’s a practical way to stay secure while focusing on your core business. Arctic Wolf is popular, but many other MDR providers offer excellent features and services. Here are nine top Arctic Wolf alternatives […]

360 Privacy Raises $36M to Expand Threat Protection Services

Cybercrime , Data Privacy , Data Security Investment to Scale Engineering, Expansion from Data Deletion to Threat Reduction Michael Novinson (MichaelNovinson) • March 14, 2025     Adam Jackson, CEO, 360 Privacy (Image: 360 Privacy) A digital executive protection platform led by an Army veteran raised $36 million to safeguard the personal data of high-profile […]

Top 5 threats keeping CISOs up at night in 2025

Cyber threats in 2025 require a proactive, adaptive approach. To stay ahead, CISOs must balance technical defenses, regulatory expectations, and human factors. By prioritizing AI-driven security, ransomware resilience, supply chain risk management, insider threat mitigation, and compliance preparedness, CISOs can strengthen their security posture. Here are the top five threats keeping CISOs up at night […]

TOP