FBI issues IC3 alert on ‘Salt Typhoon’ activity, seeks public help in investigating PRC-linked cyber campaign

Summary The FBI is calling for the public’s assistance in reporting information related to the cyber activity known as ‘Salt Typhoon,’ associated with the People’s Republic of China (PRC). This alert, issued through the Internet Crime Complaint Center (IC3), highlights a sophisticated scheme that has targeted multiple U.S. telecommunications companies, leading to theft of sensitive […]

Read More →

M&S cyberattack: online orders suspended and data watchdog notified

Summary The article provides details on user access and password management for the Newspaper Licensing Agency’s eClips Web platform. It includes instructions for users to enter their credentials and a link to manage passwords effectively. The guidelines aim to enhance user experience and security when accessing digital newspaper content. Source: Newspaper Licensing Agency Key Points […]

Read More →

Receiving odd texts for someone else? Rise of ‘wrong number’ messages is new payday for scammers

An increasing number of seemingly random texts are being used by scammers to trick users into revealing personal information. As the frequency of these ‘wrong number’ scams rises, it’s crucial to be aware of the tactics being employed by cybercriminals. Key Points Scammers are using innocuous texts to engage users and validate active phone numbers. […]

Read More →

Hackers Attack Catawba Nation’s Two Kings Casino

Cybercriminals have recently targeted the Catawba Nation’s Two Kings Casino, threatening to release sensitive security documents unless a ransom is paid. The casino is now working with cybersecurity experts to determine if any customer data has been compromised. Catawba Nation Casino Under Attack The attack, claimed by a hacker group known as the Anubis group, […]

Read More →

Five Key Elements To Consider Before Designing A Cyber Exercise

Steve Durbin, CEO of Information Security Forum, outlines critical aspects that organisations need to focus on when designing effective cyber exercises. These exercises are essential for ensuring your team is well-prepared to tackle potential cyber threats efficiently and effectively. Below are the key elements to consider: Key Points Governance is essential for accountability and establishing […]

Read More →

AI and the future of human labor: Threat or partnership?

Enrique Segura dives into the controversial relationship between artificial intelligence and employment. With recent advancements in generative AI, many are questioning whether machines will replace human workers entirely or become our collaborators. The article highlights a startup’s ambitious goal to automate all white-collar jobs, sparking concerns about job displacement, the limitations of AI, and the […]

Read More →

Hackers Attack Catawba Nation’s Two Kings Casino

Two Kings Casino has been targeted by hackers from the Anubis group, demanding a ransom to prevent the release of sensitive blueprints. The Catawba Nation, overseeing the casino, is collaborating with cybersecurity experts to ascertain any potential data breaches, though they currently find no evidence impacting operations or customer data. The hack specifically mentioned outdated […]

Read More →

ServiceNow Stock Pops 15.5% As DOGE And Tariffs Drive New Demand

On April 25, 2025, ServiceNow’s stock surged by 15.5% after the company reported better-than-expected quarterly results, boosted by factors such as Trump’s tariffs and increased demand in the wake of economic adjustments. The platform, essential for managing corporate services like IT and HR, is leveraging current circumstances to drive growth and efficiency. Source: Forbes Key […]

Read More →