Category: Information Security Buzz

Cyberattack Crashes the Party Amid DeepSeek’s Meteoric Rise

Chinese artificial intelligence (AI) startup DeepSeek, which has taken the market by storm, has temporarily limited new user registrations following a large-scale cyberattack that disrupted its services.   According to Reuters, the attack coincided with the company’s AI assistant becoming the…

Attackers Exploit PDFs in Sophisticated Mishing Attack

In a newly discovered phishing campaign, malicious actors are using malicious PDF files to target mobile device users in potentially more than 50 countries.   Dubbed the “PDF Mishing Attack,” the campaign exploits the widespread trust in PDFs as a secure…

GoDaddy’s Cybersecurity Called into Question

The Federal Trade Commission (FTC) has filed a complaint that GoDaddy has violated Section 5 of the FTC Act pertaining to “unfair methods of competition” through “unfair or deceptive acts or practices.” The complaint details how GoDaddy’s failure to implement…

A Strategic Approach to Container Security

Containerization technologies have transformed how applications are built, deployed, and managed. From speeding up production cycles to enabling seamless scalability, they have become the backbone of mission-critical enterprise applications. Gartner predicts that by 2027, 90% of global organizations will run…

The Unchanging Nature of Human Nature

At the conclusion of each calendar year, organizations and observers across all industries try to put forward predictions on what the new year might hold, and we at Thales were no exception. In the latest episode of our Thales Security…

Can’t Start a Fire Without a Spark

Code Intelligence has started 2025 with a bang and captured the interest of the cybersecurity community by announcing ‘Spark,’ their new AI Test Agent, ahead of a launch party later this month. Influential AI-automated software testing company Code Intelligence has…

Securing Health Data in 2025: The Rising Cybersecurity Challenges

Since 1996, the Health Insurance Portability and Accountability Act (HIPAA) has been the cornerstone of patient privacy. The act established standards for how healthcare organizations handle and share patient data, creating a framework for ensuring confidentiality.  But the healthcare landscape…

Sneaky 2FA Kit Exposes Vulnerabilities in 2FA Security

Cybersecurity researchers from Sekoia have discovered a new Adversary-in-the-Middle (AiTM) phishing kit named “Sneaky 2FA,” targeting Microsoft 365 accounts. First discovered in December last year, this phishing kit has been active since at least October 2024 and is distributed as…