Iranian and Russian Entities Sanctioned for Election Interference Using AI and Cyber Tactics
Jan 01, 2025Ravie LakshmananGenerative AI / Election Interference The U.S. Treasury Department's…
New “DoubleClickjacking” Exploit Bypasses Clickjacking Protections on Major Websites
Jan 01, 2025Ravie LakshmananWeb Security / Vulnerability Threat hunters have disclosed a…
Misconfigured Kubernetes RBAC in Azure Airflow Could Expose Entire Cluster to Exploitation
Cybersecurity researchers have uncovered three security weaknesses in Microsoft's Azure Data Factory…
Chinese APT Exploits BeyondTrust API Key to Access U.S. Treasury Systems and Documents
Dec 31, 2024Ravie LakshmananVulnerability / Incident Response The United States Treasury Department…
New U.S. DoJ Rule Halts Bulk Data Transfers to Adversarial Nations to Protect Privacy
Dec 31, 2024Ravie LakshmananData Security / Privacy The U.S. Department of Justice…
New HIPAA Rules Mandate 72-Hour Data Restoration and Annual Compliance Audits
Dec 30, 2025Ravie LakshmananCybersecurity / Compliance The United States Department of Health…
Top 10 Cybersecurity Trends to Expect in 2025
The 2025 cybersecurity landscape is increasingly complex, driven by sophisticated cyber threats,…
16 Chrome Extensions Hacked, Exposing Over 600,000 Users to Data Theft
Dec 29, 2025Ravie LakshmananEndpoint Protection / Browser Security A new attack campaign…
Rockstar2FA Collapse Fuels Expansion of FlowerStorm Phishing-as-a-Service
Dec 23, 2024Ravie LakshmananPhishing / Cybercrime An interruption to the phishing-as-a-service (PhaaS)…