Top 5 threats keeping CISOs up at night in 2025

Cyber threats in 2025 require a proactive, adaptive approach. To stay ahead, CISOs must balance technical defenses, regulatory expectations, and human factors. By prioritizing AI-driven security, ransomware resilience, supply chain risk management, insider threat mitigation, and compliance preparedness, CISOs can strengthen their security posture. Here are the top five threats keeping CISOs up at night […]

360 Privacy Raises $36M to Expand Threat Protection Services

Cybercrime , Data Privacy , Data Security Investment to Scale Engineering, Expansion from Data Deletion to Threat Reduction Michael Novinson (MichaelNovinson) • March 14, 2025     Adam Jackson, CEO, 360 Privacy (Image: 360 Privacy) A digital executive protection platform led by an Army veteran raised $36 million to safeguard the personal data of high-profile […]

Man found guilty of planting infinite loop logic bomb on ex-employer’s system

55-year old Davis Lu, of Houston, Texas, has been found guilty of intentionally causing damage to the computer systems of his ex-employer, and could face up to 10 years in prison. Lu had been employed as a software developer between 2007 and 2019 by multinational firm Eaton, which provides energy-efficient solutions for the aerospace, automotive […]

Week-long Exchange Online outage causes email failures, delays

Microsoft says it partially mitigated a week-long Exchange Online outage causing delays or failures when sending or receiving email messages. While the company didn’t publicly share information on this incident, it tagged it as a critical service issue tracked under EX1027675 on the Microsoft 365 Admin Center. Microsoft has yet to share more information on […]

GSMA Confirms End-to-End Encryption for RCS, Enabling Secure Cross-Platform Messaging

Mar 14, 2025Ravie LakshmananMobile Security / Encryption The GSM Association (GSMA) has formally announced support for end-to-end encryption (E2EE) for securing messages sent via the Rich Communications Services (RCS) protocol, bringing much-needed security protections to cross-platform messages shared between Android and iOS platforms. To that end, the new GSMA specifications for RCS include E2EE based […]

US must prioritize cybersecurity training for the military’s engineers

The Trump administration begins under the shadow of a series of consequential Chinese cyber hacks targeting U.S. critical infrastructure. While incoming officials grapple with long-standing failures to deter China and other adversaries from launching cyberattacks on the U.S. homeland, the Department of Defense (DOD) faces a startling capability gap: The civilian and military professionals responsible […]

Notorious Malware, Spam Host “Prospero” Moves to Kaspersky Lab – Krebs on Security

One of the most notorious providers of abuse-friendly “bulletproof” web hosting for cybercriminals has started routing its operations through networks run by the Russian antivirus and security firm Kaspersky Lab, KrebsOnSecurity has learned. Security experts say the Russia-based service provider Prospero OOO (the triple O is the Russian version of “LLC”) has long been a […]

Navigating AI-powered cyber threats in 2025: 4 expert security tips for businesses

ebrublue10/Getty Images Cybercriminals are weaponizing artificial intelligence (AI) across every attack phase. Large language models (LLMs) craft hyper-personalized phishing emails by scraping targets’ social media profiles and professional networks. Generative adversarial networks (GAN) produce deepfake audio and video to bypass multi-factor authentication. Automated tools like WormGPT enable script kiddies to launch polymorphic malware that evolves […]

‘People Are Scared’: Inside CISA as It Reels From Trump’s Purge

The departures have strained a workforce that was already stretched thin. “We were running into [a] critical skills shortage previously,” says a second employee. “Most people are and have been doing the work of two or more full-time [staffers].” The CISA team that helps critical infrastructure operators respond to hacks has been understaffed for years. […]

TOP