Cybersecurity

Hacker mass-mails HungerRush extortion emails to restaurant patrons

Customers of restaurants using the HungerRush point-of-sale (POS) platform say they received emails from a threat actor attempting to extort the company, warning that restaurant and customer data could be exposed if HungerRush fails to respond. […] Source: https://www.bleepingcomputer.com/news/security/hacker-mass-mails-hungerrush-extortion-emails-to-restaurant-patrons/

Hacker mass-mails HungerRush extortion emails to restaurant patrons Read More »

Cybersecurity

149 Hacktivist DDoS Attacks Hit 110 Organizations in 16 Countries After Middle East Conflict

Cybersecurity researchers have warned of a surge in retaliatory hacktivist activity following the U.S.-Israel coordinated military campaign against Iran, codenamed Epic Fury and Roaring Lion. “The hacktivist threat in the Middle East is highly lopsided, with two groups, Keymous+ and DieNet, driving nearly 70% of all attack activity between February 28 and March 2,” Radware

149 Hacktivist DDoS Attacks Hit 110 Organizations in 16 Countries After Middle East Conflict Read More »

Cybersecurity

Zurich Acquires Beazley in $11 Billion Deal to Lead Cyberinsurance

The deal awaits final shareholder and regulatory approvals and is expected to be completed in the second half of 2026. The post Zurich Acquires Beazley in $11 Billion Deal to Lead Cyberinsurance appeared first on SecurityWeek. Source: https://www.securityweek.com/zurich-acquires-beazley-in-11-billion-deal-to-lead-cyberinsurance/

Zurich Acquires Beazley in $11 Billion Deal to Lead Cyberinsurance Read More »

Cybersecurity

Hacker Conversations: Inti De Ceukelaire, Raging Against the Machine Creatively

A Belgian national, De Ceukelaire’ did not set out to be a hacker. Like many hackers he was born with the potential to become one and only gradually realized he is one. The post Hacker Conversations: Inti De Ceukelaire, Raging Against the Machine Creatively appeared first on SecurityWeek. Source: https://www.securityweek.com/hacker-conversations-inti-de-ceukelaire-raging-against-the-machine-creatively/

Hacker Conversations: Inti De Ceukelaire, Raging Against the Machine Creatively Read More »

Cybersecurity

Coruna iOS Exploit Kit Uses 23 Exploits Across Five Chains Targeting iOS 13–17.2.1

Google said it identified a “new and powerful” exploit kit dubbed Coruna (aka CryptoWaters) targeting Apple iPhone models running iOS versions between 13.0 and 17.2.1. The exploit kit featured five full iOS exploit chains and a total of 23 exploits, Google Threat Intelligence Group (GTIG) said. It’s not effective against the latest version of iOS.

Coruna iOS Exploit Kit Uses 23 Exploits Across Five Chains Targeting iOS 13–17.2.1 Read More »

Cybersecurity

How Pirated Software Turns Helpful Employees Into Malware Delivery Agents

Employees seeking free versions of paid software may unknowingly install malware-laced “cracked” apps that can steal credentials, deploy cryptominers, or open the door to ransomware. The post How Pirated Software Turns Helpful Employees Into Malware Delivery Agents appeared first on SecurityWeek. Source: https://www.securityweek.com/how-pirated-software-turns-helpful-employees-into-malware-delivery-agents/

How Pirated Software Turns Helpful Employees Into Malware Delivery Agents Read More »

Cybersecurity

New RFP Template for AI Usage Control and AI Governance 

As AI becomes the central engine for enterprise productivity, security leaders are finally getting the green light — and the budget — to secure it. But there’s a quiet crisis unfolding in the boardroom: many organizations know they need “AI Governance,” but they have no idea what they are actually looking for. The CISO’s Dilemma:

New RFP Template for AI Usage Control and AI Governance  Read More »

Cybersecurity

Webinar Today: Designing an OT SOC for Safety, Reliability, and Business Continuity

Join the webinar as we explore a blueprint for an OT SOC leveraging an integrated OT Security Platform to safeguard operations and maintain business continuity. The post Webinar Today: Designing an OT SOC for Safety, Reliability, and Business Continuity appeared first on SecurityWeek. Source: https://www.securityweek.com/webinar-today-designing-an-ot-soc-for-safety-reliability-and-business-continuity/

Webinar Today: Designing an OT SOC for Safety, Reliability, and Business Continuity Read More »

Cybersecurity