Tag: Cyber Security News

93+ Billion Stolen Users’ Cookies Flooded by Hackers on the Dark Web

Security researchers have uncovered a significant cybercrime operation involving 93.7 billion stolen browser cookies circulating on dark web marketplaces, representing a 74% increase from the previous year’s findings.  The comprehensive analysis, conducted by NordStellar threat exposure management platform, reveals that…

Incident Response Planning – Preparing for Data Breaches

As the digital threat landscape intensifies and new technologies reshape business operations, cybersecurity budgeting in 2025 will be significantly transformed. Organizations worldwide are increasing their security spending and rethinking how to allocate resources most effectively to defend against evolving risks…

Cybersecurity Budgeting – Prioritizing Investments in 2025

As the digital threat landscape intensifies and new technologies reshape business operations, cybersecurity budgeting in 2025 will be significantly transformed. Organizations worldwide are increasing their security spending and rethinking how to allocate resources most effectively to defend against evolving risks…

Hackers Exploiting Craft CMS Vulnerability To Inject Crypto Miner Malware

A sophisticated cyber campaign has emerged targeting a critical vulnerability in Craft Content Management System, with threat actors successfully deploying cryptocurrency mining malware across compromised servers. The vulnerability, designated CVE-2025-32432, represents a remote code execution flaw that requires no authentication…

MATLAB With Over 5 Million Customers Suffers Ransomware Attack

MathWorks, the Massachusetts-based developer of the widely used MATLAB programming platform, has confirmed that a ransomware attack severely disrupted its services for over a week, affecting millions of engineers, scientists, and students worldwide.  The company finally disclosed the nature of…

Securing Supply Chains – Mitigating Third-Party Risks

As global supply chains become increasingly complex and digitally interconnected, the risks posed by third-party vendors have moved from background concern to boardroom priority. In 2025, companies face a new reality: supply chain resilience is inseparable from third-party risk management,…

Regulatory Compliance – Navigating Cybersecurity Laws

As digital threats escalate and technology rapidly evolves, regulatory compliance has become a defining challenge for organizations worldwide. In 2025, new and updated cybersecurity laws are reshaping how businesses protect data, manage risk, and demonstrate accountability. Navigating this complex legal…

Cybersecurity Skills Gap – Training the Next Generation

The digital revolution has brought unprecedented connectivity and innovation, but it has also unleashed a wave of cyber threats that challenge the very fabric of our interconnected world. As organizations race to defend their data and infrastructure, a critical bottleneck…

CISA Releases ICS Advisories Covering Vulnerabilities & Exploits

The Cybersecurity and Infrastructure Security Agency (CISA) released a significant Industrial Control Systems (ICS) advisory targeting a memory leak vulnerability in Johnson Controls’ iSTAR Configuration Utility (ICU) Tool, highlighting ongoing security challenges facing critical infrastructure sectors worldwide.  This latest advisory…