by Syndicated News Feed | Oct 24, 2025 | IT Security
Shadow IT leaves organizations exposed to cyberattacks and raises the risk of data loss and compliance failures 24 Oct 2025 In the remote and hybrid work era, employee use of unsanctioned hardware and software (known as shadow IT) has become an acute problem that...
by Syndicated News Feed | Oct 24, 2025 | IT Security
UK Prime Minister Keir Starmer has relaunched his digital ID scheme as something that will make people’s lives easier, less than four weeks after announcing it as a measure to tackle illegal working. Digital ID will be compulsory for anyone taking a new job...
by Syndicated News Feed | Oct 24, 2025 | IT Security
US defense technology biz Shield AI claims it can build a jet-powered vertical take-off and landing (VTOL) autonomous fighter drone that doesn’t need a runway to operate. The California-based biz this week unveiled a mock-up of its X-BAT aircraft at an event...
by Syndicated News Feed | Oct 24, 2025 | IT Security
The Pwn2Own Ireland 2025 hacking competition has ended with security researchers collecting $1,024,750 in cash awards after exploiting 73 zero-day vulnerabilities. At Pwn2Own Ireland 2025, competitors targeted products in eight categories, including printers, network...
by Syndicated News Feed | Oct 24, 2025 | IT Security
Iran’s favorite muddy-footed cyberespionage crew is at it again, this time breaching more than 100 government entities across the Middle East and North Africa, according to researchers at Group-IB. The campaign, which began in August, used a compromised...
by Syndicated News Feed | Oct 23, 2025 | IT Security
Federal prosecutors have charged a former general manager of US government defense contractor L3Harris’s cyber arm Trenchant with selling secrets to an unidentified Russian buyer for $1.3 million. According to the Justice Department, Peter Williams stole seven...
by Syndicated News Feed | Oct 23, 2025 | IT Security
The Canadian outpost of retailer Toys R Us on Thursday notified customers that attackers accessed a database, stole some of their personal information, then posted the data online. In a Thursday breach disclosure notice emailed to affected customers and shared on...
by Syndicated News Feed | Oct 23, 2025 | IT Security
Today, Microsoft introduced Mico, a new and more personal avatar for the AI-powered Copilot digital assistant, which the company describes as human-centered. This new avatar is designed to be more supportive and empathetic, but will also push back when presented with...
by Syndicated News Feed | Oct 23, 2025 | IT Security
Google has taken down thousands of YouTube videos that were quietly spreading password-stealing malware disguised as cracked software and game cheats. Researchers at Check Point say the so-called “YouTube Ghost Network” hijacked and weaponized legitimate...
by Syndicated News Feed | Oct 23, 2025 | IT Security
ESET researchers have recently observed a new instance of Operation DreamJob – a campaign that we track under the umbrella of North Korea-aligned Lazarus – in which several European companies active in the defense industry were targeted. Some of these are heavily...