The Hague, the Netherlands, March 13th, 2025, CyberNewsWire Founded in 2024, Modat – the European-crafted, research-driven, AI-powered cybersecurity company, has announced the launch of its premier product, Modat Magnify. Designed by and for cybersecurity professionals, the team behind the product aims to speed up the lives of these individuals easier by giving them access to […]
How Can Threat Hunters Use EDR to Prevent Advanced Threats?
When hackers started using automation and AI, traditional cybersecurity stopped being enough. During the past years, security teams focused more on proactively searching for hidden threats and stopping their escalation. And this is exactly what threat hunting does. Instead of waiting for an alert, security experts investigate unusual behavior, correlate data, and uncover hidden attacks. […]
LockBit ransomware developer Rostislav Panev was extradited from Israel to the U.S.
LockBit ransomware developer Rostislav Panev was extradited from Israel to the U.S. Pierluigi Paganini March 14, 2025 The US Justice Department announced that the LockBit ransomware developer Rostislav Panev was extradited from Israel to the U.S. The US Justice Department announced that one of the LockBit ransomware developer, Rostislav Panev (51), has been extradited to […]
How Security Leaders Defend Their Attack Surface
Modern attack surfaces extend across every place your business operates, from your first-party technology assets to your third-party network of suppliers and vendors. To spot risks before attackers do, you need to maintain continuous visibility across this expanding landscape. Employee credentials can become compromised, unknown or vulnerable internet assets can be exploited, and supply chain […]
Symantec Demonstrates OpenAI’s Operator Agent in PoC Phishing Attack
Symantec’s threat hunters have demonstrated how AI agents like OpenAI’s recently launched “Operator“ could be abused for cyberattacks. While AI agents are designed to boost productivity by automating routine tasks, Symantec’s research shows they could also execute complex attack sequences with minimal human input. This is a big change from older AI models, which could […]
A gag order backfires, and a snail mail ransom demand • Graham Cluley
What happens when a healthcare giant’s legal threats ignite a Streisand Effect wildfire… while a ransomware gang appears to ditch the dark web for postage stamps? Find out about this, and more, in the latest edition of the “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault. Warning: This podcast may contain nuts, […]
Insurer Notifying 335,500 Customers, Agents, Others of Hack
Cybercrime , Data Breach Notification , Data Security Texas Incident is Largest Breach Reported by a Health Plan So Far in 2025 Marianne Kolbasuk McGee (HealthInfoSec) • March 14, 2025 New Era Life Insurance Companies is notifying 355,500 individuals of a hack affecting their information – the largest health data breach reported by […]
Corero Network Security expands AI capabilities across its portfolio
Corero Network Security announced the strategic advancement of AI capabilities across its product portfolio and operations—building on a long-standing legacy of intelligent, adaptive security solutions. For years, Corero’s SmartWall ONE platform has delivered automated, real-time DDoS protection powered by advanced detection and adaptive response mechanisms. While others are now racing to add “AI” labels to […]
‘Untrusted device’ errors on Chromecast? Google is rolling out a fix
ZDNET Is your Chromecast device having issues? You’re not alone. Google says a fix is rolling out, though. Second-generation Chromecast and Chromecast Audio devices are facing a problem that prevents them from casting content. If you try to use an affected device, you’ll see one of two errors — either, “Untrusted device: [name] couldn’t be […]
Coinbase phishing email tricks users with fake wallet migration
A large-scale Coinbase phishing attack poses as a mandatory wallet migration, tricking recipients into setting up a new wallet with a pre-generated recovery phrase controlled by attackers. The emails have a subject of “Migrate to Coinbase Wallet” and state that all customers must transition to self-custodial wallets. The email also provides instructions on how to […]