threats

AI agents can leak company data through simple web searches

AI agents can leak company data through simple web searches 2025-10-29 at 10:24 By Mirko Zorz When a company deploys an AI agent that can search the web and access internal documents, most teams assume the agent is simply working as intended. New research shows how that same setup can be used to quietly pull […]

React to this headline:

Loading spinner

AI agents can leak company data through simple web searches Read More »

Scammers target international students by threatening their visa status

Scammers target international students by threatening their visa status 2025-10-29 at 08:29 By Sinisa Markovic In 2025, the U.S. government revoked thousands of visas from international students, often without warning or explanation. According to a newly released study, this opened a door for scammers. Posing as government officials, police, or university staff, they took advantage

React to this headline:

Loading spinner

Scammers target international students by threatening their visa status Read More »

DDoS, data theft, and malware are storming the gaming industry

DDoS, data theft, and malware are storming the gaming industry 2025-10-27 at 08:46 By Sinisa Markovic When the pandemic kept people at home in 2020, millions turned to games for an escape. The surge turned every console, PC, and phone into part of a vast online network. More players meant more logins, payments, and personal

React to this headline:

Loading spinner

DDoS, data theft, and malware are storming the gaming industry Read More »

What Microsoft’s 2025 report reveals about the new rules of engagement in cyberdefense

What Microsoft’s 2025 report reveals about the new rules of engagement in cyberdefense 2025-10-24 at 10:42 By Anamarija Pogorelec Adversaries are using AI to sharpen attacks, automate operations, and challenge long-standing defenses, according to a new Microsoft report. Researchers describe a year in which criminal and state-backed actors blurred the lines between cybercrime, espionage, and

React to this headline:

Loading spinner

What Microsoft’s 2025 report reveals about the new rules of engagement in cyberdefense Read More »

Your wearable knows your heartbeat, but who else does?

Your wearable knows your heartbeat, but who else does? 2025-10-23 at 09:23 By Sinisa Markovic Smartwatches, glucose sensors, and connected drug-monitoring devices are common in care programs. Remote monitoring helps detect changes early and supports personalized treatment and long-term condition management. They give clinicians valuable insight into patient health but also introduce new exposure points.

React to this headline:

Loading spinner

Your wearable knows your heartbeat, but who else does? Read More »

The next cyber crisis may start in someone else’s supply chain

The next cyber crisis may start in someone else’s supply chain 2025-10-23 at 09:23 By Anamarija Pogorelec Organizations are getting better at some aspects of risk management but remain underprepared for the threats reshaping the business landscape, according to a new Riskonnect report. The findings show a growing gap between awareness and action as technology,

React to this headline:

Loading spinner

The next cyber crisis may start in someone else’s supply chain Read More »

How Lazarus Group used fake job ads to spy on Europe’s drone and defense sector

How Lazarus Group used fake job ads to spy on Europe’s drone and defense sector 2025-10-23 at 09:23 By Sinisa Markovic ESET researchers have uncovered a fresh wave of Operation DreamJob, a long-running campaign linked to North Korea’s Lazarus Group. This latest activity targeted several European defense contractors, including firms deeply involved in drone and

React to this headline:

Loading spinner

How Lazarus Group used fake job ads to spy on Europe’s drone and defense sector Read More »

Companies want the benefits of AI without the cyber blowback

Companies want the benefits of AI without the cyber blowback 2025-10-22 at 07:19 By Anamarija Pogorelec 51% of European IT and cybersecurity professionals said they expect AI-driven cyber threats and deepfakes to keep them up at night in 2026, according to ISACA. AI takes centre stage in threat outlook The main reason for this concern

React to this headline:

Loading spinner

Companies want the benefits of AI without the cyber blowback Read More »

The solar power boom opened a backdoor for cybercriminals

The solar power boom opened a backdoor for cybercriminals 2025-10-14 at 11:49 By Sinisa Markovic Solar isn’t low risk anymore. Adoption has turned inverters, aggregators, and control software into attack surfaces capable of disrupting service and undermining confidence in the transition. Cyber threats expose weak spots in solar power systems Until recently, security risks in

React to this headline:

Loading spinner

The solar power boom opened a backdoor for cybercriminals Read More »

Cybersecurity’s next test: AI, quantum, and geopolitics

Cybersecurity’s next test: AI, quantum, and geopolitics 2025-10-07 at 14:03 By Anamarija Pogorelec Geopolitics, emerging technology, and skills shortages are reshaping cybersecurity priorities across industries, according to a new PwC report. The findings show a mix of rising awareness, persistent weaknesses, and uneven preparation for the next wave of threats. Geopolitical risk at the core

React to this headline:

Loading spinner

Cybersecurity’s next test: AI, quantum, and geopolitics Read More »

Phishing is old, but AI just gave it new life

Phishing is old, but AI just gave it new life 2025-10-06 at 07:03 By Anamarija Pogorelec The volume of cyberattacks has reached staggering levels, with new tactics that blur the line between legitimate and malicious activity. A new threat report from Comcast, based on 34.6 billion cybersecurity events analyzed over the past year, shows what

React to this headline:

Loading spinner

Phishing is old, but AI just gave it new life Read More »

The energy sector is ground zero for global cyber activity

The energy sector is ground zero for global cyber activity 2025-10-02 at 08:27 By Sinisa Markovic A new study from the Karlsruhe Institute of Technology shows how geopolitical tensions shape cyberattacks on power grids, fuel systems, and other critical infrastructure. How the research was done Researchers reviewed major cyber threat databases including MITRE ATT&CK Groups,

React to this headline:

Loading spinner

The energy sector is ground zero for global cyber activity Read More »

Ransomware remains the leading cause of costly cyber claims

Ransomware remains the leading cause of costly cyber claims 2025-10-01 at 07:04 By Anamarija Pogorelec Cyber threats are shifting in 2025, and while large companies are still targets, attackers are turning their attention to smaller and mid-sized firms. According to Allianz’s Cyber Security Resilience 2025 report, hardened defenses at major corporates have pushed criminals to

React to this headline:

Loading spinner

Ransomware remains the leading cause of costly cyber claims Read More »

Cybersecurity leaders underreport cyber incidents to executives

Cybersecurity leaders underreport cyber incidents to executives 2025-09-29 at 08:04 By Anamarija Pogorelec Cyberattacks are becoming more frequent and severe, with 71% of surveyed security leaders saying attacks have grown more common in the past year and 61% reporting greater impact when incidents occur, according to a new report from VikingCloud. Nation-state attacks move to

React to this headline:

Loading spinner

Cybersecurity leaders underreport cyber incidents to executives Read More »

Inside the economy built on stolen credentials

Inside the economy built on stolen credentials 2025-09-26 at 09:08 By Sinisa Markovic Instead of going after software flaws or network weaknesses, attackers are targeting something much easier to steal: identity credentials. A new report from BeyondID calls this growing black market the identity economy, where usernames, passwords, tokens, and access rights are bought and

React to this headline:

Loading spinner

Inside the economy built on stolen credentials Read More »

Predicting DDoS attacks: How deep learning could give defenders an early warning

Predicting DDoS attacks: How deep learning could give defenders an early warning 2025-09-25 at 10:12 By Sinisa Markovic Distributed denial-of-service (DDoS) attacks remain one of the most common and disruptive forms of cybercrime. Defenders have traditionally focused on detecting these attacks once they are underway. New research suggests that predicting DDoS attacks in advance may

React to this headline:

Loading spinner

Predicting DDoS attacks: How deep learning could give defenders an early warning Read More »

The fight to lock down drones and their supply chains

The fight to lock down drones and their supply chains 2025-09-25 at 10:12 By Sinisa Markovic Drones have already shown their impact in military operations, and their influence is spreading across the agricultural and industrial sectors. Given their technological capabilities, we need to be aware of the risks they bring. Drones as a new attack

React to this headline:

Loading spinner

The fight to lock down drones and their supply chains Read More »

U.S. Secret Service takes down network of devices threatening government officials

U.S. Secret Service takes down network of devices threatening government officials 2025-09-23 at 16:48 By Sinisa Markovic The U.S. Secret Service has broken up a network of electronic devices spread across the New York tristate area that officials say posed an imminent threat to national security. The devices were being used to launch telecommunications attacks

React to this headline:

Loading spinner

U.S. Secret Service takes down network of devices threatening government officials Read More »

Cybercriminals are going after law firms’ sensitive client data

Cybercriminals are going after law firms’ sensitive client data 2025-09-23 at 10:47 By Sinisa Markovic Regardless of their size, all law firms hold valuable data, including client communications, financial records, and confidential legal strategies. That data has never been more at risk. Cybercriminals are targeting law firms by exploiting vulnerabilities, weak passwords, outdated systems, and

React to this headline:

Loading spinner

Cybercriminals are going after law firms’ sensitive client data Read More »

The unseen side of malware and how to find it

The unseen side of malware and how to find it 2025-09-19 at 08:31 By Anamarija Pogorelec Security teams rely on threat reports to understand what’s out there and to keep their organizations safe. But a new report shows that these reports might only reveal part of the story. Hidden malware variants are quietly slipping past

React to this headline:

Loading spinner

The unseen side of malware and how to find it Read More »

Scroll to Top